Sciweavers

61 search results - page 1 / 13
» On the Deployment of Mobile Trusted Modules
Sort
View
WCNC
2008
IEEE
13 years 11 months ago
On the Deployment of Mobile Trusted Modules
— In its recently published TCG Mobile Reference Architecture, the TCG Mobile Phone Work Group specifies a new concept to enable trust into future mobile devices. For this purpo...
Andreas U. Schmidt, Nicolai Kuntze, Michael Kasper
CARDIS
2008
Springer
113views Hardware» more  CARDIS 2008»
13 years 6 months ago
The Trusted Execution Module: Commodity General-Purpose Trusted Computing
This paper introduces the Trusted Execution Module (TEM); a high-level specification for a commodity chip that can execute usersupplied procedures in a trusted environment. The TEM...
Victor Costan, Luis F. G. Sarmenta, Marten van Dij...
IDTRUST
2010
ACM
13 years 3 months ago
A proposal for collaborative internet-scale trust infrastructures deployment: the public key system (PKS)
Public Key technology is about multiple parties across different domains making assertions that can be chained together to make trust judgments. Today, the need for more interoper...
Massimiliano Pala
CORR
2010
Springer
159views Education» more  CORR 2010»
13 years 4 months ago
Survey of trust models in different network domains
This paper introduces the security and trust concepts in wireless sensor networks and explains the difference between them, stating that even though both terms are used interchang...
Mohammad Momani, Subhash Challa
ESORICS
2003
Springer
13 years 10 months ago
Hardware Encapsulation of Security Services
Hardware security modules can be used to encapsulate simple security services that bind security functions such as decryption with authorisation and authentication. Such hardware ...
Adrian Baldwin, Simon Shiu