Nepal et al., 2011 - Google Patents
A mobile and portable trusted computing platformNepal et al., 2011
View HTML- Document ID
- 7092758239214068792
- Author
- Nepal S
- Zic J
- Liu D
- Jang J
- Publication year
- Publication venue
- EURASIP Journal on Wireless Communications and Networking
External Links
Snippet
The mechanism of establishing trust in a computing platform is tightly coupled with the characteristics of a specific machine. This limits the portability and mobility of trust as demanded by many emerging applications that go beyond the organizational boundaries. In …
- 238000005259 measurement 0 description 15
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Cabrera-Gutiérrez et al. | Integration of hardware security modules and permissioned blockchain in industrial iot networks | |
Shepherd et al. | Secure and trusted execution: Past, present, and future-a critical review in the context of the internet of things and cyber-physical systems | |
Parno et al. | Bootstrapping trust in commodity computers | |
US8549592B2 (en) | Establishing virtual endorsement credentials for dynamically generated endorsement keys in a trusted computing platform | |
US20060256108A1 (en) | Method and apparatus for remotely provisioning software-based security coprocessors | |
US20070094719A1 (en) | Method and apparatus for migrating virtual trusted platform modules | |
US20060256107A1 (en) | Methods and apparatus for generating endorsement credentials for software-based security coprocessors | |
WO2006124751A2 (en) | Method and apparatus for providing software-based security coprocessors | |
Stumpf et al. | An approach to a trustworthy system architecture using virtualization | |
Nauman et al. | Using trusted computing for privacy preserving keystroke-based authentication in smartphones | |
Nepal et al. | A mobile and portable trusted computing platform | |
Aslam et al. | Security and trust preserving inter‐and intra‐cloud VM migrations | |
Parno | Trust extension as a mechanism for secure code execution on commodity computers | |
Lee et al. | Secure mobile device structure for trust IoT | |
Kushwah et al. | PSec: programming secure distributed systems using enclaves | |
Kostiainen | On-board credentials: an open credential platform for mobile devices | |
Fournaris et al. | From hardware security tokens to trusted computing and trusted systems | |
Nauman et al. | Token: Trustable keystroke-based authentication for web-based applications on smartphones | |
Brasser et al. | Softer Smartcards: Usable Cryptographic Tokens with Secure Execution | |
Nepal et al. | Trust extension device: providing mobility and portability of trust in cooperative information systems | |
Niemi et al. | Platform attestation in consumer devices | |
Andrade et al. | Experimental evaluation and expansion suggestion of Digital Signatures available on OP-TEE | |
Shepherd | Techniques for Establishing Trust in Modern Constrained Sensing Platforms with Trusted Execution Environments | |
Hohl et al. | Look who’s talking–authenticating service access points | |
Nepal et al. | Trusted computing platform in your pocket |