咨询与建议

限定检索结果

文献类型

  • 81 篇 会议
  • 57 篇 期刊文献
  • 1 篇 学位论文

馆藏范围

  • 139 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 132 篇 工学
    • 107 篇 计算机科学与技术...
    • 54 篇 电气工程
    • 30 篇 软件工程
    • 27 篇 信息与通信工程
    • 10 篇 网络空间安全
    • 8 篇 仪器科学与技术
    • 8 篇 电子科学与技术(可...
    • 4 篇 控制科学与工程
    • 4 篇 石油与天然气工程
    • 2 篇 交通运输工程
    • 1 篇 机械工程
    • 1 篇 土木工程
    • 1 篇 安全科学与工程
  • 13 篇 理学
    • 7 篇 数学
    • 7 篇 化学
    • 5 篇 生物学
    • 1 篇 统计学(可授理学、...
  • 6 篇 管理学
    • 6 篇 管理科学与工程(可...
  • 1 篇 法学
    • 1 篇 法学
  • 1 篇 文学
    • 1 篇 新闻传播学
  • 1 篇 医学
    • 1 篇 临床医学
    • 1 篇 特种医学
  • 1 篇 军事学
    • 1 篇 军队指挥学

主题

  • 139 篇 trusted platform...
  • 29 篇 trusted computin...
  • 15 篇 security
  • 11 篇 remote attestati...
  • 10 篇 internet of thin...
  • 10 篇 cloud computing
  • 9 篇 direct anonymous...
  • 8 篇 wireless sensor ...
  • 8 篇 tpm
  • 7 篇 authentication
  • 7 篇 security in iot
  • 7 篇 cryptography
  • 6 篇 data integrity
  • 6 篇 trusted executio...
  • 5 篇 data security
  • 5 篇 trusted computin...
  • 5 篇 embedded systems
  • 5 篇 mobile trusted m...
  • 5 篇 blockchain
  • 5 篇 trust

机构

  • 5 篇 mil univ technol...
  • 3 篇 nanyang technol ...
  • 3 篇 xidian univ sch ...
  • 3 篇 fraunhofer inst ...
  • 2 篇 xidian univ sch ...
  • 2 篇 univ grenoble al...
  • 2 篇 iowa state univ ...
  • 2 篇 beijing jiaotong...
  • 2 篇 school of inform...
  • 2 篇 univ grenoble al...
  • 2 篇 fraunhofer iosb ...
  • 2 篇 eut tirana alban...
  • 2 篇 graz univ techno...
  • 2 篇 network & educat...
  • 2 篇 gifu univ gifu 3
  • 2 篇 national enginee...
  • 2 篇 infineon technol...
  • 2 篇 put tirana alban...
  • 2 篇 nanjing univ sci...
  • 2 篇 iowa state univ ...

作者

  • 9 篇 furtak janusz
  • 7 篇 chudzikiewicz ja...
  • 6 篇 zielinski zbigni...
  • 5 篇 chen liqun
  • 3 篇 ma jianfeng
  • 3 篇 kim jeongnyeo
  • 3 篇 castillo encarna...
  • 3 篇 escobar-molero a...
  • 3 篇 kim daewon
  • 3 篇 urian rainer
  • 3 篇 morales diego p.
  • 3 篇 akram raja naeem
  • 3 篇 goh weihan
  • 3 篇 yeo chai kiat
  • 3 篇 wagner steffen
  • 3 篇 parrilla luis
  • 3 篇 dong xuewen
  • 3 篇 lu di
  • 2 篇 schellekens drie...
  • 2 篇 kadry sara

语言

  • 137 篇 英文
  • 2 篇 其他
检索条件"主题词=Trusted Platform Module"
139 条 记 录,以下是61-70 订阅
排序:
Security in Container-based Virtualization through vTPM  16
Security in Container-based Virtualization through vTPM
收藏 引用
9th IEEE/ACM International Conference on Utility and Cloud Computing (UCC)
作者: Hosseinzadeh, Shohreh Lauren, Samuel Leppanen, Ville Univ Turku Dept Informat Technol Turku Finland
Cloud computing is a wide-spread technology that enables the enterprises to provide services to their customers with a lower cost, higher performance, better availability and scal-ability. However, privacy and securit... 详细信息
来源: 评论
Concept of Smart Building Cyber-physical Systems Including Tamper Resistant Endpoints
Concept of Smart Building Cyber-physical Systems Including T...
收藏 引用
IEEE International Conference and Workshop in Obuda on Electrical and Power Engineering (CANDO-EPE)
作者: Puesche, Andreas Bothe, David Niemeyer, Marco Sachweh, Sabine Pohlmann, Norbert Kunold, Ingo Univ Appl Sci & Arts Dortmund IDiAL Dortmund Germany Univ Appl Sci Gelsenkirchen Inst Internet Secur Gelsenkirchen Germany Univ Appl Sci & Arts Dortmund Inst Commun Technol Dortmund Germany
Cyber-physical systems (CPS) and their Internet of things (loT) components are repeatedly subject to various attacks targeting weaknesses in their firmware. For that reason emerges an imminent demand for secure update... 详细信息
来源: 评论
On Design of a trusted Software Base with Support of TPCM
On Design of a Trusted Software Base with Support of TPCM
收藏 引用
1st International Conference on trusted Systems (INTRUST 2009)
作者: Shi, Wenchang Minist Educ Key Lab Data Engn & Knowledge Engn Beijing 100872 Peoples R China
Building trusted computing systems has been continuous endeavors for a long time. However, an increasing amount of trust problems remain unsolved in real-world applications. One of the most important reasons is that i... 详细信息
来源: 评论
Securing transmissions between nodes of WSN using TPM
Securing transmissions between nodes of WSN using TPM
收藏 引用
3rd International Conference on Innovative Network Systems and Applications (iNetSApp) held in conjunction with Federated Conference on Computer Science and Information Systems (FedCSIS)
作者: Furtak, Janusz Chudzikiewicz, Jan Mil Univ Technol Ul Kaliskiego 2 PL-00908 Warsaw Poland
Nowadays, Wireless Sensors Networks (WSN) are the most important components in the booming Internet of Things (IoT). Given the use of WSN in systems that are part of the critical infrastructure of a country, the prima... 详细信息
来源: 评论
SSL Client Authentication with TPM
SSL Client Authentication with TPM
收藏 引用
15th International Conference on Cyberworlds
作者: Kakei, Shohei Mohri, Masami Shiraishi, Yoshiaki Morii, Masakatu Kobe Univ Kobe Hyogo 6578501 Japan Gifu Univ Gifu 5011193 Japan
TPM-embedded devices can be used as authentication tokens by issuing certificates to signing keys generated by TPM. TPM generates Attestation Identity Key (AIK) and Binding Key (BK) that are RSA keys. AIK is used to i... 详细信息
来源: 评论
trusted Tamper-Evident Data Provenance  14
Trusted Tamper-Evident Data Provenance
收藏 引用
Joint 14th IEEE Int Conf on Trust, Secur and Privacy in Comp and Commun / 13th IEEE Int Symposium on Parallel and Distributed Proc with Applications / 9th IEEE Int Conf on Big Data Science and Engineering (IEEE TrustCom-ISPA-BigDataSE)
作者: Taha, Mohammad M. Bany Chaisiri, Sivadon Ko, Ryan K. L. Univ Waikato Cyber Secur Lab Hamilton New Zealand
Data provenance, the origin and derivation history of data, is commonly used for security auditing, forensics and data analysis. While provenance loggers provide evidence of data changes, the integrity of the provenan... 详细信息
来源: 评论
An In-Out-VM Measurement Architecture Against Dynamic Attacks in Clouds
An In-Out-VM Measurement Architecture Against Dynamic Attack...
收藏 引用
14th IEEE International Conference on Communication Technology (ICCT)
作者: Wang, Yao Mao, Yaqiang Luo, Yuan Shanghai Jiao Tong Univ Comp Sci & Engn Dept Shanghai 200030 Peoples R China
As we know, the biggest challenge for SaaS (software as a service) cloud computing systems is guaranteeing user-level security. For this end, some approaches and systems have been proposed for virtual machine in cloud... 详细信息
来源: 评论
New Results for Timing-Based Attestation
New Results for Timing-Based Attestation
收藏 引用
33rd IEEE Symposium on Security and Privacy (SP)
作者: Kovah, Xeno Kallenberg, Corey Weathers, Chris Herzog, Amy Albin, Matthew Butterworth, John Mitre Corp Bedford MA 01730 USA
In this paper we present a comprehensive timing-based attestation system suitable for typical enterprise use, and evidence of that system's performance. This system, similar to Pioneer [20] but built with relaxed ... 详细信息
来源: 评论
Secure and trusted Execution: Past, Present and Future - A Critical Review in the Context of the Internet of Things and Cyber-Physical Systems  15
Secure and Trusted Execution: Past, Present and Future - A C...
收藏 引用
15th IEEE Int Conf on Trust, Security and Privacy in Comp and Commun / 10th IEEE Int Conf on Big Data Science and Engineering / 14th IEEE Int Symposium on Parallel and Distributed Proc with Applicat (IEEE Trustcom/BigDataSE/ISPA)
作者: Shepherd, Carlton Arfaoui, Ghada Gurulian, Iakovos Lee, Robert P. Markantonakis, Konstantinos Akram, Raja Naeem Sauveron, Damien Conchon, Emmanuel Royal Holloway Univ London ISG SCC Egham Surrey England Univ Limoges Dept Math Informat CNRS XLIMUMR 7252 Limoges France Univ Bordeaux CNRS UMR 5800 LaBRI Talence France Orange Labs Chatillon France
Notions like security, trust, and privacy are crucial in the digital environment and in the future, with the advent of technologies like the Internet of Things (IoT) and Cyber-Physical Systems (CPS), their importance ... 详细信息
来源: 评论
Towards a firmware TPM on RISC-V
Towards a firmware TPM on RISC-V
收藏 引用
Design, Automation and Test in Europe Conference and Exhibition (DATE)
作者: Boubakri, Marouene Chiatante, Fausto Zouari, Belhassen NXP Syst Engn Sophia Antipolis France Univ Carthage SupCom Mediatron Lab Tunis Tunisia
To develop the next generation of Internet of Things, Edge devices and systems which leverage progress in enabling technologies such as 5G, distributed computing and artificial intelligence (AI), several requirements ... 详细信息
来源: 评论