Ruan, 2014 - Google Patents
Looking Ahead: Tomorrow's Innovations Built on Today's FoundationRuan, 2014
View HTML- Document ID
- 5491454043829881221
- Author
- Ruan X
- Publication year
- Publication venue
- Platform Embedded Security Technology Revealed
External Links
Snippet
Looking Ahead: Tomorrow’s Innovations Built on Today’s Foundation | SpringerLink Skip to
main content Advertisement Springer Nature Link Account Menu Find a journal Publish with us
Track your research Search Cart 1.Home 2.Platform Embedded Security Technology Revealed …
- 238000005516 engineering process 0 description 16
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Buhren et al. | Insecure until proven updated: analyzing AMD SEV's remote attestation | |
| Weiser et al. | Sgxio: Generic trusted i/o path for intel sgx | |
| Shepherd et al. | Secure and trusted execution: Past, present, and future-a critical review in the context of the internet of things and cyber-physical systems | |
| Jain et al. | OpenSGX: An Open Platform for SGX Research. | |
| EP2207121B1 (en) | Protecting content on virtualized client platforms | |
| US11727115B2 (en) | Secured computer system | |
| US20190312902A1 (en) | Identity based behavior measurement architecture | |
| Sadeghi | Trusted computing—special aspects and challenges | |
| Fuchs et al. | Advanced remote firmware upgrades using TPM 2.0 | |
| Mannan et al. | Unicorn: Two-factor attestation for data security | |
| Cilardo et al. | Secure distribution infrastructure for hardware digital contents | |
| Rabimba et al. | Lessons learned from blockchain applications of trusted execution environments and implications for future research | |
| Gunn et al. | Hardware platform security for mobile devices | |
| Wagner et al. | Distributed usage control enforcement through trusted platform modules and sgx enclaves | |
| Zhang et al. | Security enforcement model for distributed usage control | |
| Mofrad et al. | Leveraging Intel SGX to create a nondisclosure cryptographic library | |
| Gallery | An overview of trusted computing technology | |
| Yuhala et al. | Fortress: Securing IoT Peripherals with Trusted Execution Environments | |
| Yamak et al. | DICEguard: enhancing DICE security for IoT devices with periodic memory forensics | |
| Ashraf et al. | Analytical study of hardware-rooted security standards and their implementation techniques in mobile | |
| Futral et al. | Fundamental principles of intel® txt | |
| Ruan | Looking Ahead: Tomorrow’s Innovations Built on Today’s Foundation | |
| Jenkins | Defense in Depth of Resource-Constrained Devices | |
| Kepa et al. | IP protection in partially reconfigurable FPGAs | |
| Umar et al. | Trusted Execution Environment and Host Card Emulation |