咨询与建议

限定检索结果

文献类型

  • 81 篇 会议
  • 57 篇 期刊文献
  • 1 篇 学位论文

馆藏范围

  • 139 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 132 篇 工学
    • 107 篇 计算机科学与技术...
    • 54 篇 电气工程
    • 30 篇 软件工程
    • 27 篇 信息与通信工程
    • 10 篇 网络空间安全
    • 8 篇 仪器科学与技术
    • 8 篇 电子科学与技术(可...
    • 4 篇 控制科学与工程
    • 4 篇 石油与天然气工程
    • 2 篇 交通运输工程
    • 1 篇 机械工程
    • 1 篇 土木工程
    • 1 篇 安全科学与工程
  • 13 篇 理学
    • 7 篇 数学
    • 7 篇 化学
    • 5 篇 生物学
    • 1 篇 统计学(可授理学、...
  • 6 篇 管理学
    • 6 篇 管理科学与工程(可...
  • 1 篇 法学
    • 1 篇 法学
  • 1 篇 文学
    • 1 篇 新闻传播学
  • 1 篇 医学
    • 1 篇 临床医学
    • 1 篇 特种医学
  • 1 篇 军事学
    • 1 篇 军队指挥学

主题

  • 139 篇 trusted platform...
  • 29 篇 trusted computin...
  • 15 篇 security
  • 11 篇 remote attestati...
  • 10 篇 internet of thin...
  • 10 篇 cloud computing
  • 9 篇 direct anonymous...
  • 8 篇 wireless sensor ...
  • 8 篇 tpm
  • 7 篇 authentication
  • 7 篇 security in iot
  • 7 篇 cryptography
  • 6 篇 data integrity
  • 6 篇 trusted executio...
  • 5 篇 data security
  • 5 篇 trusted computin...
  • 5 篇 embedded systems
  • 5 篇 mobile trusted m...
  • 5 篇 blockchain
  • 5 篇 trust

机构

  • 5 篇 mil univ technol...
  • 3 篇 nanyang technol ...
  • 3 篇 xidian univ sch ...
  • 3 篇 fraunhofer inst ...
  • 2 篇 xidian univ sch ...
  • 2 篇 univ grenoble al...
  • 2 篇 iowa state univ ...
  • 2 篇 beijing jiaotong...
  • 2 篇 school of inform...
  • 2 篇 univ grenoble al...
  • 2 篇 fraunhofer iosb ...
  • 2 篇 eut tirana alban...
  • 2 篇 graz univ techno...
  • 2 篇 network & educat...
  • 2 篇 gifu univ gifu 3
  • 2 篇 national enginee...
  • 2 篇 infineon technol...
  • 2 篇 put tirana alban...
  • 2 篇 nanjing univ sci...
  • 2 篇 iowa state univ ...

作者

  • 9 篇 furtak janusz
  • 7 篇 chudzikiewicz ja...
  • 6 篇 zielinski zbigni...
  • 5 篇 chen liqun
  • 3 篇 ma jianfeng
  • 3 篇 kim jeongnyeo
  • 3 篇 castillo encarna...
  • 3 篇 escobar-molero a...
  • 3 篇 kim daewon
  • 3 篇 urian rainer
  • 3 篇 morales diego p.
  • 3 篇 akram raja naeem
  • 3 篇 goh weihan
  • 3 篇 yeo chai kiat
  • 3 篇 wagner steffen
  • 3 篇 parrilla luis
  • 3 篇 dong xuewen
  • 3 篇 lu di
  • 2 篇 schellekens drie...
  • 2 篇 kadry sara

语言

  • 137 篇 英文
  • 2 篇 其他
检索条件"主题词=Trusted Platform Module"
139 条 记 录,以下是21-30 订阅
排序:
Remote attestation on legacy operating systems with trusted platform modules
收藏 引用
SCIENCE OF COMPUTER PROGRAMMING 2008年 第1-2期74卷 13-22页
作者: Schellekens, Dries Wyseur, Brecht Preneel, Bart Katholieke Univ Leuven Dept ESAT SCD COSIC B-3001 Heverlee Belgium
A lot of progress has been made to secure network communication, e.g., through the use of cryptographic algorithms. However, this offers only a partial solution as long as the communicating end points still suffer fro... 详细信息
来源: 评论
A remote attestation protocol with trusted platform modules (TPMs) in wireless sensor networks
收藏 引用
SECURITY AND COMMUNICATION NETWORKS 2015年 第13期8卷 2171-2188页
作者: Tan, Hailun Hu, Wen Jha, Sanjay Univ New S Wales Sch Comp Sci Engn Sydney NSW 2052 Australia
Given the limited resources and computational power of current embedded sensor devices, memory protection is difficult to achieve and generally unavailable. Hence, the software run-time buffer overflow that is used by... 详细信息
来源: 评论
Remote Attestation on Legacy Operating Systems With trusted platform modules
收藏 引用
ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE 2008年 第1期197卷 59-72页
作者: Schellekens, Dries Wyseur, Brecht Preneel, Bart Katholieke Univ Leuven Dept ESAT SCD COSIC Kasteelpk Arenberg 10 B-3001 Heverlee Belgium
A lot of progress has been made to secure network communication, e.g., through the use of cryptographic algorithms. However, this offers only a partial solution as long as the communicating end points still suffer fro... 详细信息
来源: 评论
Distributed Usage Control Enforcement through trusted platform modules and SGX Enclaves  18
Distributed Usage Control Enforcement through Trusted Platfo...
收藏 引用
23rd ACM Symposium on Access Control Models and Technologies (SACMAT)
作者: Wagner, Paul Georg Birnstill, Pascal Beyerer, Juergen Karlsruhe Inst Technol Karlsruhe Germany Fraunhofer IOSB Karlsruhe Germany
In the light of mobile and ubiquitous computing, sharing sensitive information across different computer systems has become an increasingly prominent practice. This development entails a demand of access control measu... 详细信息
来源: 评论
TPM-Based Remote Attestation for Wireless Sensor Networks
收藏 引用
Tsinghua Science and Technology 2016年 第3期21卷 312-321页
作者: Donglai Fu Xinguang Peng Software School of North University of China Taiyuan 030051China School of Computer Science&Technology Taiyuan University of TechnologyTaiyuan 030051China.
It is essential to design a protocol to allow sensor nodes to attest to their trustworthiness for mission- critical applications based on Wireless Sensor Networks (WSNs). However, it is a challenge to evaluate the t... 详细信息
来源: 评论
An Enhanced Direct Anonymous Attestation Scheme with Mutual Authentication for Network-Connected UAV Communication Systems
收藏 引用
China Communications 2018年 第5期15卷 61-76页
作者: Liquan Chen Sijie Qian Ming Lim Shihui Wang School of Information Science and Engineering Southeast University Research Center of Supply Chain and Operations Management Coventry University
In network-connected UAV(NCUAV) communication systems, user authentication is replaced by platform identity authentication and integrity check because many NC-UAVs are operated without human intervention. Direct anony... 详细信息
来源: 评论
LiveForen: Ensuring Live Forensic Integrity in the Cloud
收藏 引用
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY 2019年 第10期14卷 2749-2764页
作者: Liu, Anyi Fu, Huirong Hong, Yuan Liu, Jigang Li, Yingjiu Oakland Univ Dept Comp Sci & Engn Rochester MI 48309 USA IIT Dept Comp Sci Chicago IL 60616 USA Metropolitan State Univ Dept Comp Sci & Cybersecur St Paul MN 55106 USA Singapore Management Univ Sch Informat Syst Singapore 188065 Singapore
To expedite the forensic investigation process in the cloud, excessive and yet volatile data need to be acquired, transmitted, and analyzed in a timely manner. A common assumption for most existing forensic systems is... 详细信息
来源: 评论
Smaug: A TEE-Assisted Secured SQLite for Embedded Systems
收藏 引用
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING 2023年 第5期20卷 3617-3635页
作者: Lu, Di Shi, Minqiang Ma, Xindi Liu, Ximeng Guo, Rui Zheng, Tianfang Shen, Yulong Dong, Xuewen Ma, Jianfeng Xidian Univ Sch Comp Sci & Technol Xian 710071 Shaanxi Peoples R China Xidian Univ Sch Cyber Engn Xian 710071 Shaanxi Peoples R China Guilin Univ Elect Technol Guangxi Key Lab Trusted Software Guilin 541004 Guangxi Peoples R China Fuzhou Univ Coll Comp & Data Sci Fuzhou 350025 Fujian Peoples R China
As one of the most popular relational databases for embedded devices, SQLite is lightweight to be embedded into applications without installing a specific database management system. However, simplicity and easy-to-us... 详细信息
来源: 评论
A trust enhancement scheme for cluster-based wireless sensor networks
收藏 引用
JOURNAL OF SUPERCOMPUTING 2019年 第5期75卷 2761-2788页
作者: Wang, Tianshu Hu, Kongfa Xichen Yang Gongxuan, Zhang Wang, Yongli Nanjing Univ Chinese Med Sch Informat Technol Nanjing Jiangsu Peoples R China Nanjing Normal Univ Sch Comp Sci & Technol Nanjing Jiangsu Peoples R China Nanjing Univ Sci & Technol Sch Comp Sci & Engn Nanjing Jiangsu Peoples R China
Security is crucial in wireless sensor networks (WSNs) since a growing variety of applications require strict security. Cluster-based architecture has an enhancement in the system performance of WSNs. This article pre... 详细信息
来源: 评论
Design and Implementation of Mobile trusted module for trusted Mobile Computing
收藏 引用
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS 2010年 第1期56卷 134-140页
作者: Kim, Mooseop Ju, Hongil Kim, Youngsae Park, Jiman Park, Youngsoo Elect & Telecommun Res Inst Taejon 305700 South Korea
This paper presents the design and implementation of a Mobile trusted module (MTM) which should satisfy small area and low-power condition. Unlike the general trusted platform module (TPM) for PCs, the MTM, that is to... 详细信息
来源: 评论