咨询与建议

限定检索结果

文献类型

  • 81 篇 会议
  • 56 篇 期刊文献
  • 1 篇 学位论文

馆藏范围

  • 138 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 131 篇 工学
    • 106 篇 计算机科学与技术...
    • 54 篇 电气工程
    • 29 篇 软件工程
    • 27 篇 信息与通信工程
    • 10 篇 网络空间安全
    • 8 篇 仪器科学与技术
    • 8 篇 电子科学与技术(可...
    • 4 篇 控制科学与工程
    • 4 篇 石油与天然气工程
    • 2 篇 交通运输工程
    • 1 篇 机械工程
    • 1 篇 土木工程
    • 1 篇 安全科学与工程
  • 13 篇 理学
    • 7 篇 数学
    • 7 篇 化学
    • 5 篇 生物学
    • 1 篇 统计学(可授理学、...
  • 6 篇 管理学
    • 6 篇 管理科学与工程(可...
  • 1 篇 法学
    • 1 篇 法学
  • 1 篇 文学
    • 1 篇 新闻传播学
  • 1 篇 医学
    • 1 篇 临床医学
    • 1 篇 特种医学
  • 1 篇 军事学
    • 1 篇 军队指挥学

主题

  • 138 篇 trusted platform...
  • 29 篇 trusted computin...
  • 14 篇 security
  • 11 篇 remote attestati...
  • 10 篇 internet of thin...
  • 10 篇 cloud computing
  • 9 篇 direct anonymous...
  • 8 篇 wireless sensor ...
  • 8 篇 tpm
  • 8 篇 cryptography
  • 7 篇 authentication
  • 7 篇 security in iot
  • 6 篇 trusted executio...
  • 5 篇 data security
  • 5 篇 data integrity
  • 5 篇 trusted computin...
  • 5 篇 embedded systems
  • 5 篇 mobile trusted m...
  • 5 篇 blockchain
  • 5 篇 trust

机构

  • 5 篇 mil univ technol...
  • 3 篇 nanyang technol ...
  • 3 篇 xidian univ sch ...
  • 3 篇 fraunhofer inst ...
  • 2 篇 xidian univ sch ...
  • 2 篇 univ grenoble al...
  • 2 篇 iowa state univ ...
  • 2 篇 beijing jiaotong...
  • 2 篇 school of inform...
  • 2 篇 univ grenoble al...
  • 2 篇 fraunhofer iosb ...
  • 2 篇 eut tirana alban...
  • 2 篇 graz univ techno...
  • 2 篇 network & educat...
  • 2 篇 gifu univ gifu 3
  • 2 篇 national enginee...
  • 2 篇 infineon technol...
  • 2 篇 put tirana alban...
  • 2 篇 nanjing univ sci...
  • 2 篇 iowa state univ ...

作者

  • 9 篇 furtak janusz
  • 7 篇 chudzikiewicz ja...
  • 6 篇 zielinski zbigni...
  • 5 篇 chen liqun
  • 3 篇 ma jianfeng
  • 3 篇 kim jeongnyeo
  • 3 篇 castillo encarna...
  • 3 篇 escobar-molero a...
  • 3 篇 kim daewon
  • 3 篇 urian rainer
  • 3 篇 morales diego p.
  • 3 篇 akram raja naeem
  • 3 篇 goh weihan
  • 3 篇 yeo chai kiat
  • 3 篇 wagner steffen
  • 3 篇 parrilla luis
  • 3 篇 dong xuewen
  • 3 篇 lu di
  • 2 篇 schellekens drie...
  • 2 篇 kadry sara

语言

  • 136 篇 英文
  • 2 篇 其他
检索条件"主题词=Trusted Platform Module"
138 条 记 录,以下是1-10 订阅
排序:
trusted platform module for Smart Cards
Trusted Platform Module for Smart Cards
收藏 引用
6th IFIP International Conference on New Technologies, Mobility and Security (NTMS)
作者: Akram, Raja Naeem Markantonakis, Konstantinos Mayes, Keith Univ Waikato Dept Comp Sci Hamilton New Zealand Univ London Smart Card Ctr Informat Secur Grp Egham Surrey England
Near Field Communication (NFC)-based mobile phone services offer a lifeline to the under-appreciated multi-application smart card initiative. The initiative could effectively replace heavy wallets full of smart cards ... 详细信息
来源: 评论
xTSeH: A trusted platform module Sharing Scheme Towards Smart IoT-eHealth Devices
收藏 引用
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS 2021年 第2期39卷 370-383页
作者: Lu, Di Han, Ruidong Shen, Yulong Dong, Xuewen Ma, Jianfeng Du, Xiaojiang Guizani, Mohsen Xidian Univ Sch Comp Sci & Technol Xian 710071 Peoples R China Henan Univ Technol Minist Educ Key Lab Grain Informat Proc & Control Zhengzhou 450001 Peoples R China Xidian Univ Sch Network Engn Xian 710071 Peoples R China Temple Univ Dept Comp & Informat Sci Philadelphia PA 19122 USA Qatar Univ Dept Comp Sci & Engn Doha Qatar
IoT based eHealth system brings a revolution to healthcare industry, with which the old healthcare systems can be updated into smarter and more personalized ones. The practitioners can continue monitoring the physical... 详细信息
来源: 评论
A Plausibly-Deniable, Practical trusted platform module Based Anti-Forensics Client-Server System
收藏 引用
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS 2011年 第7期29卷 1377-1391页
作者: Goh, Weihan Leong, Peng Chor Yeo, Chai Kiat Nanyang Technol Univ Sch Comp Engn Singapore 639798 Singapore
A trusted platform module (TPM) contains a unique identity and provides a range of security functions. This paper demonstrates a novel approach of using a TPM-enabled computer in a client-server system to hinder foren... 详细信息
来源: 评论
A trusted Architecture for Virtual Machines on Cloud Servers with trusted platform module and Certificate Authority
收藏 引用
JOURNAL OF SIGNAL PROCESSING SYSTEMS FOR SIGNAL IMAGE AND VIDEO TECHNOLOGY 2017年 第2-3期86卷 327-336页
作者: Yu, Zhilou Zhang, Weipin Dai, Hongjun Southeast Univ Sch Informat Sci & Engn Nanjing 10096 Jiangsu Peoples R China Shandong Univ Dept Comp Sci & Technol Jinan 250101 Peoples R China
Virtualization and cloud computing can help an organization achieve significant datacenter savings in hardware costs, operational expenditures, and energy demands while achieving improvements in quality of service and... 详细信息
来源: 评论
A novel architecture to virtualise a hardware-bound trusted platform module
收藏 引用
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE 2024年 150卷 21-36页
作者: De Benedictis, Marco Jacquin, Ludovic Pedone, Ignazio Atzeni, Andrea Lioy, Antonio Politecn Torino Dip Automat & Informat Corso Duca Degli Abruzzi 24 I-10129 Turin Italy Hewlett Packard Enterprise Hewlett Packard Labs Bristol BS34 8QZ England
Security and trust are particularly relevant in modern softwarised infrastructures, such as cloud environments, as applications are deployed on platforms owned by third parties, are publicly accessible on the Internet... 详细信息
来源: 评论
A hijacker's guide to communication interfaces of the trusted platform module
收藏 引用
COMPUTERS & MATHEMATICS WITH APPLICATIONS 2013年 第5期65卷 748-761页
作者: Winter, Johannes Dietrich, Kurt Graz Univ Technol Inst Appl Informat Proc & Commun A-8010 Graz Austria
In this paper, we analyze the communication of trusted platform modules and their interface to the hosting platforms. While trusted platform modules are considered to be tamper resistant, the communication channel bet... 详细信息
来源: 评论
A trusted platform module Based Anti-Forensics System
A Trusted Platform Module Based Anti-Forensics System
收藏 引用
International Conference on Network and Service Security
作者: Goh, Weihan Leong, Peng Chor Yeo, Chai Kiat Nanyang Technol Univ Sch Comp Engn Singapore Singapore
A trusted platform module (TPM) contains a unique identity and provides a range of security functions. This paper outlines a client-server system utilizing a TPM-enabled computer to hinder forensic examination. The sy... 详细信息
来源: 评论
A hijacker's guide to communication interfaces of the trusted platform module
A hijacker's guide to communication interfaces of the truste...
收藏 引用
8th European Workshop on Public Key Infrastructures, Services, and Applications (EuroPKI)
作者: Winter, Johannes Dietrich, Kurt Graz Univ Technol Inst Appl Informat Proc & Commun A-8010 Graz Austria
In this paper, we analyze the communication of trusted platform modules and their interface to the hosting platforms. While trusted platform modules are considered to be tamper resistant, the communication channel bet... 详细信息
来源: 评论
A Key to Embedded System Security: Locking and Unlocking Secrets with a trusted platform module  8
A Key to Embedded System Security: Locking and Unlocking Sec...
收藏 引用
8th IEEE European Symposium on Security and Privacy (EuroS and P)
作者: Lenard, Teri Collen, Anastasija Nijdam, Niels A. Genge, Bela Univ Geneva Ctr Univ Informat Geneva Sch Econ & Management Geneva Switzerland Univ Med Pharm Sci & Technol Targu Mures Dept Elect Engn & Informat Technol George Emil Palade Targu Mures Romania
Security hardware modules were designed to provide a viable solution that can empower Embedded Systems (ES) with state-of-the-art cryptographic and security capabilities. They can execute cryptographic operations, sec... 详细信息
来源: 评论
Personal trusted platform module for the Multi-Core System of 5G Security and Privacy  13
Personal Trusted Platform Module for the Multi-Core System o...
收藏 引用
13th International ELEKTRO Conference (ELEKTRO)
作者: Ruchkin, Vladimir Fulin, Vladimir Romanchuk, Vitaly Koryachko, Alexei Ruchkina, Ekaterina Ryazan State Univ Phys & Math Fac Ryazan Russia Ryazan State Radioengn Univ Cad Comp Facil Chair Ryazan Russia Ryazan State Radioengn Univ Hist Philosophy & Law Chair Ryazan Russia
The article is devoted to the choice of personal means of the 5G defense in dependence of hard- and software available to the user. The universal module MS 127.04 and its software compatible unit can be universally co... 详细信息
来源: 评论