Trusted computing aims to build a trusted computing environment for information systems with the help of secure hardware TPM, which has been proved to be an effective way against network security threats. However, the TPM chips are not yet widely deployed in most computing devices so far, thus limiting the applied scope of trusted computing technology. To solve the problem of lacking trusted hardware in existing computing platform, an alternative security hardware USBKey is introduced in this paper to simulate the basic functions of TPM and a new reverse USBKey-based integrity verification model is proposed to implement the reverse integrity verification of the operating system boot process, which can achieve the effect of trusted boot of t...
Information security presents a huge challenge for both individuals and organizations. The Trusted C...
Several techniques exist to verify the integrity of the software image to guarantee the absence of m...
AbstractA lot of progress has been made to secure network communication, e.g., through the use of cr...
Security controls (such as encryption endpoints, payment gateways, and firewalls) rely on correct pr...
This thesis deals with the analysis and design of trusted computing platforms. Trusted computing tec...
The Trusted Computing Base (TCB) describes the part of an IT system that is responsible for enforcin...
This paper presents an implementation of trusted boot for embedded systems. While in PCs the trusted...
Abstract: Trust is an indispensable part of the computing environment, the validity of any transacti...
The Trusted Platform Module (TPM) currently used by PCs is not suitable for embedded systems, it is ...
AbstractBased on Linux startup actual conditions, critical files in the startup process are analyzed...
The wide usage of hardware intellectual property (IP) cores and software programs from untrusted thi...
© 2018 IEEE. During the secure boot process for a trusted execution environment, the processor must ...
A computer hijacked by a malware may pretend that it is normal as usual and retrieve secrets from st...
Trusted Computing Group (TCG) has proposed the Trusted Computing (TC) concept. Subsequently, TC beco...
Trusted Platform Module (TPM) is a security token embedded in every business laptop and computers. I...
Information security presents a huge challenge for both individuals and organizations. The Trusted C...
Several techniques exist to verify the integrity of the software image to guarantee the absence of m...
AbstractA lot of progress has been made to secure network communication, e.g., through the use of cr...
Security controls (such as encryption endpoints, payment gateways, and firewalls) rely on correct pr...
This thesis deals with the analysis and design of trusted computing platforms. Trusted computing tec...
The Trusted Computing Base (TCB) describes the part of an IT system that is responsible for enforcin...
This paper presents an implementation of trusted boot for embedded systems. While in PCs the trusted...
Abstract: Trust is an indispensable part of the computing environment, the validity of any transacti...
The Trusted Platform Module (TPM) currently used by PCs is not suitable for embedded systems, it is ...
AbstractBased on Linux startup actual conditions, critical files in the startup process are analyzed...
The wide usage of hardware intellectual property (IP) cores and software programs from untrusted thi...
© 2018 IEEE. During the secure boot process for a trusted execution environment, the processor must ...
A computer hijacked by a malware may pretend that it is normal as usual and retrieve secrets from st...
Trusted Computing Group (TCG) has proposed the Trusted Computing (TC) concept. Subsequently, TC beco...
Trusted Platform Module (TPM) is a security token embedded in every business laptop and computers. I...
Information security presents a huge challenge for both individuals and organizations. The Trusted C...
Several techniques exist to verify the integrity of the software image to guarantee the absence of m...
AbstractA lot of progress has been made to secure network communication, e.g., through the use of cr...