咨询与建议

限定检索结果

文献类型

  • 81 篇 会议
  • 57 篇 期刊文献
  • 1 篇 学位论文

馆藏范围

  • 139 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 132 篇 工学
    • 107 篇 计算机科学与技术...
    • 54 篇 电气工程
    • 30 篇 软件工程
    • 27 篇 信息与通信工程
    • 10 篇 网络空间安全
    • 8 篇 仪器科学与技术
    • 8 篇 电子科学与技术(可...
    • 4 篇 控制科学与工程
    • 4 篇 石油与天然气工程
    • 2 篇 交通运输工程
    • 1 篇 机械工程
    • 1 篇 土木工程
    • 1 篇 安全科学与工程
  • 13 篇 理学
    • 7 篇 数学
    • 7 篇 化学
    • 5 篇 生物学
    • 1 篇 统计学(可授理学、...
  • 6 篇 管理学
    • 6 篇 管理科学与工程(可...
  • 1 篇 法学
    • 1 篇 法学
  • 1 篇 文学
    • 1 篇 新闻传播学
  • 1 篇 医学
    • 1 篇 临床医学
    • 1 篇 特种医学
  • 1 篇 军事学
    • 1 篇 军队指挥学

主题

  • 139 篇 trusted platform...
  • 29 篇 trusted computin...
  • 15 篇 security
  • 11 篇 remote attestati...
  • 10 篇 internet of thin...
  • 10 篇 cloud computing
  • 9 篇 direct anonymous...
  • 8 篇 wireless sensor ...
  • 8 篇 tpm
  • 7 篇 authentication
  • 7 篇 security in iot
  • 7 篇 cryptography
  • 6 篇 data integrity
  • 6 篇 trusted executio...
  • 5 篇 data security
  • 5 篇 trusted computin...
  • 5 篇 embedded systems
  • 5 篇 mobile trusted m...
  • 5 篇 blockchain
  • 5 篇 trust

机构

  • 5 篇 mil univ technol...
  • 3 篇 nanyang technol ...
  • 3 篇 xidian univ sch ...
  • 3 篇 fraunhofer inst ...
  • 2 篇 xidian univ sch ...
  • 2 篇 univ grenoble al...
  • 2 篇 iowa state univ ...
  • 2 篇 beijing jiaotong...
  • 2 篇 school of inform...
  • 2 篇 univ grenoble al...
  • 2 篇 fraunhofer iosb ...
  • 2 篇 eut tirana alban...
  • 2 篇 graz univ techno...
  • 2 篇 network & educat...
  • 2 篇 gifu univ gifu 3
  • 2 篇 national enginee...
  • 2 篇 infineon technol...
  • 2 篇 put tirana alban...
  • 2 篇 nanjing univ sci...
  • 2 篇 iowa state univ ...

作者

  • 9 篇 furtak janusz
  • 7 篇 chudzikiewicz ja...
  • 6 篇 zielinski zbigni...
  • 5 篇 chen liqun
  • 3 篇 ma jianfeng
  • 3 篇 kim jeongnyeo
  • 3 篇 castillo encarna...
  • 3 篇 escobar-molero a...
  • 3 篇 kim daewon
  • 3 篇 urian rainer
  • 3 篇 morales diego p.
  • 3 篇 akram raja naeem
  • 3 篇 goh weihan
  • 3 篇 yeo chai kiat
  • 3 篇 wagner steffen
  • 3 篇 parrilla luis
  • 3 篇 dong xuewen
  • 3 篇 lu di
  • 2 篇 schellekens drie...
  • 2 篇 kadry sara

语言

  • 137 篇 英文
  • 2 篇 其他
检索条件"主题词=Trusted Platform Module"
139 条 记 录,以下是91-100 订阅
排序:
Using First Order Logic to Reason about TCG's TPM Specification
Using First Order Logic to Reason about TCG's TPM Specificat...
收藏 引用
International Forum on Information Technology and Applications (IFITA 2009)
作者: Yang Yang Zhang Huanguo Xu Shiwei Zhang Fan Wuhan Univ Sch Comp Wuhan 430072 Peoples R China
trusted platform module (TPM) provides the cryptographic functions through the Application Programming Interfaces (APIs). The specification of APIs reflects the security policies of the designers, in order to manage a... 详细信息
来源: 评论
A DAA Scheme Requiring Less TPM Resources
A DAA Scheme Requiring Less TPM Resources
收藏 引用
5th China International Conference on Information Security and Cryptology
作者: Chen, Liqun Hewlett-Packard Laboratories United Kingdom
Direct anonymous attestation (DAA) is a special digital signature primitive, which provides a balance between signer authentication and privacy. One of the most interesting properties that makes this primitive attract... 详细信息
来源: 评论
A Secure Channel Establishment Method on A Hardware Security module  5
A Secure Channel Establishment Method on A Hardware Security...
收藏 引用
5th International Conference on Information and Communication Technology Convergence (ICTC)
作者: Kim, Daewon Jeon, Yongsung Kim, Jeongnyeo Elect & Telecommun Res Inst Cyber Secur Res Dept Daejeon South Korea
In various computing environments, hardware security modules are needed for protecting cryptographic keys and security services from threats of information leakage. For that protection, the modules normally have the m... 详细信息
来源: 评论
Towards Practical Hardware Fingerprinting for Remote Attestation  1
收藏 引用
39th International Conference on ICT Systems Security and Privacy Protection (SEC)
作者: Eckel, Michael Fenzl, Florian Jaeger, Lukas Fraunhofer SIT Cyber Phys Syst Secur Rheinstr 75 D-64295 Darmstadt Germany ATHENE Natl Res Ctr Appl Cybersecur Rheinstr 75 D-64295 Darmstadt Germany
In the realm of trusted Computing for embedded systems, ensuring the integrity of both firmware and hardware presents a complex challenge. Traditional approaches have focused on detecting firmware and operating system... 详细信息
来源: 评论
A New Process and Framework for Direct Anonymous Attestation Based on Symmetric Bilinear Maps
收藏 引用
Wuhan University Journal of Natural Sciences 2011年 第5期16卷 369-375页
作者: TAN Liang1,2, ZHOU Mingtian3 1. College of Computer/Key Lab of Visualization in Scientific Computing and Virtual Reality of Sichuan, Sichuan Normal University, Chengdu 610066, Sichuan, China 2. Institute of Computing Technology, Chinese Academy of Sciences, Beijing 100190, China 3. School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu 610054, Sichuan, China College of Computer/Key Lab of Visualization in Scientific Computing and Virtual Reality of Sichuan Sichuan Normal University Chengdu Sichuan China Institute of Computing Technology Chinese Academy of Sciences Beijing China School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu Sichuan China
For the problem of the original direct anonymous attestation (DAA) scheme's complexity and great time consumption, a new DAA scheme based on symmetric bilinear pairings is presented, which gives a practical solutio... 详细信息
来源: 评论
Procedures for sensor nodes operation in the secured domain
Procedures for sensor nodes operation in the secured domain
收藏 引用
Annual Workshop on Intelligent Systems for the Internet of Things
作者: Furtak, Janusz Zielinski, Zbigniew Chudzikiewicz, Jan Mil Univ Technol Fac Cybernet PL-00908 Warsaw Poland
Currently, the networks of mobile sensor nodes, which are IoT components, are increasingly a source of data for building situational awareness. Such networks can be a source of data for critical infrastructure systems... 详细信息
来源: 评论
System Integrity - A Cautionary Tale
System Integrity - A Cautionary Tale
收藏 引用
IEEE International Conference on Physical Assurance and Inspection of Electronics (PAINE)
作者: Surendrababu, Hema Karnam Univ Trans Disciplinary Hlth Sci & Technol Natl Inst Adv Studies Bengaluru India
One of the vital security requirements in information systems is integrity of information that is processed. Current security practices place more emphasis on protection of data with less focus on protection of the sy... 详细信息
来源: 评论
Securing Elapsed Time for Blockchain: Proof of Hardware Time and some of its Physical Threats  27
Securing Elapsed Time for Blockchain: Proof of Hardware Time...
收藏 引用
27th Euromicro Conference on Digital System Design
作者: Jayet, Quentin Hennebert, Christine Kieffer, Yann Beroulle, Vincent Univ Grenoble Alpes CEA LETI DSYS F-38000 Grenoble France Univ Grenoble Alpes Grenoble INP LCIS F-26000 Valence France
Blockchain technology enables the creation of a time-stamped, shared, and replicated history of events among participants who do not trust each other. To agree on the shared history, the blockchain uses a consensus pr... 详细信息
来源: 评论
Algorithm Agility - Discussion on TPM 2.0 ECC Functionalities  1
收藏 引用
3rd International Conference on Research in Security Standardization (SSR)
作者: Chen, Liqun Urian, Rainer Hewlett Packard Labs Palo Alto CA USA Univ Surrey Guildford Surrey England Infineon Technol AG Neubiberg Germany
The TPM 2.0 specification has been designed to support a number of Elliptic Curve Cryptographic (ECC) primitives, such as key exchange, digital signatures and Direct Anonymous Attestation (DAA). In order to meet the r... 详细信息
来源: 评论
Trustworthy and Personalized Computing on Public Kiosks
Trustworthy and Personalized Computing on Public Kiosks
收藏 引用
6th International Conference on Mobile Systems, Applications, and Services
作者: Garriss, Scott Caceres, Ramon Berger, Stefan Sailer, Reiner van Doorn, Leendert Zhang, Xiaolan Carnegie Mellon Univ Pittsburgh PA 15213 USA
Many people desire ubiquitous access to their personal computing environments. We present a system in which a user leverages a personal mobile device to establish trust in a public computing device, or kiosk, prior to... 详细信息
来源: 评论