Academic literature on the topic 'Trusted channel'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Trusted channel.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Trusted channel"
Dawei, Zhang, Han Zhen, Jiang Yichen, Du Ye, and Li Meihong. "Protocol for trusted channel based on portable trusted module." China Communications 10, no. 11 (November 2013): 1–14. http://dx.doi.org/10.1109/cc.2013.6674205.
Full textMa, Jun, Zhi Ying Wang, Jiang Chun Ren, Jiang Jiang Wu, Yong Cheng, and Song Zhu Mei. "Dynamic Trusted Domain: Preventing Data Leakage of Trusted Subjects." Applied Mechanics and Materials 48-49 (February 2011): 470–73. http://dx.doi.org/10.4028/www.scientific.net/amm.48-49.470.
Full textDobele, Angela, Jane Fry, Sharyn Rundle-Thiele, and Tim Fry. "Caring for baby: what sources of information do mothers use and trust?" Journal of Services Marketing 31, no. 7 (October 9, 2017): 677–89. http://dx.doi.org/10.1108/jsm-02-2015-0104.
Full textJang, Jinsoo, and Brent Byunghoon Kang. "Securing a communication channel for the trusted execution environment." Computers & Security 83 (June 2019): 79–92. http://dx.doi.org/10.1016/j.cose.2019.01.012.
Full textLiu, Hongbin, Han Zhou, Hao Chen, Yong Yan, Jianping Huang, Ao Xiong, Shaojie Yang, Jiewei Chen, and Shaoyong Guo. "A Federated Learning Multi-Task Scheduling Mechanism Based on Trusted Computing Sandbox." Sensors 23, no. 4 (February 13, 2023): 2093. http://dx.doi.org/10.3390/s23042093.
Full textEl-Badry, Rania, Moustafa Youssef, and Ahmed Sultan. "Hidden Anchor: A Lightweight Approach for Physical Layer Location Privacy." Journal of Computer Systems, Networks, and Communications 2010 (2010): 1–12. http://dx.doi.org/10.1155/2010/749298.
Full textLi, Xinyao, and Akhilesh Tyagi. "Cross-World Covert Channel on ARM Trustzone through PMU." Sensors 22, no. 19 (September 28, 2022): 7354. http://dx.doi.org/10.3390/s22197354.
Full textMa, Wei, Xiaoyong Li, Congdong Lv, and Fei Li. "An Architectural Refinement Approach Based on Trusted Channel in MLS Environment." Open Automation and Control Systems Journal 6, no. 1 (December 31, 2014): 1862–69. http://dx.doi.org/10.2174/1874444301406011862.
Full textFairchild, Alea M. "What is the Role of Third Party Logistics (3PL) Partners in an Omni-Channel Strategy?" International Journal of Operations Research and Information Systems 7, no. 1 (January 2016): 22–32. http://dx.doi.org/10.4018/ijoris.2016010102.
Full textWang, Zhe, Hui Wang, Yuning Yang, Dejian Li, Zhe Zhang, and Tiantian Wu. "The research of the side-channel analysis method based on deep learning for trusted platform module." Journal of Physics: Conference Series 2358, no. 1 (October 1, 2022): 012016. http://dx.doi.org/10.1088/1742-6596/2358/1/012016.
Full textDissertations / Theses on the topic "Trusted channel"
Moukarzel, Michael A. "µLeech: A Side-Channel Evaluation Platform for Next Generation Trusted Embedded Systems." Digital WPI, 2015. https://digitalcommons.wpi.edu/etd-theses/1034.
Full textLantz, David. "Detection of side-channel attacks targeting Intel SGX." Thesis, Linköpings universitet, Programvara och system, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-177987.
Full textReid, Jason Frederick. "Enhancing security in distributed systems with trusted computing hardware." Thesis, Queensland University of Technology, 2007. https://eprints.qut.edu.au/16379/1/Jason_Reid_Thesis.pdf.
Full textReid, Jason Frederick. "Enhancing security in distributed systems with trusted computing hardware." Queensland University of Technology, 2007. http://eprints.qut.edu.au/16379/.
Full textMoghimi, Ahmad. "Side-Channel Attacks on Intel SGX: How SGX Amplifies The Power of Cache Attack." Digital WPI, 2017. https://digitalcommons.wpi.edu/etd-theses/399.
Full textZhang, Ruide. "Hardware-Aided Privacy Protection and Cyber Defense for IoT." Diss., Virginia Tech, 2020. http://hdl.handle.net/10919/98791.
Full textDoctor of Philosophy
The past few years have witnessed a rising in computing and networking technologies. Such advances enable the new paradigm, IoT, which brings great convenience to people's life. Large technology companies like Google, Apple, Amazon are creating smart devices such as smartwatch, smart home, drones, etc. Compared to the traditional internet, IoT can provide services beyond digital information by interacting with the physical world by its sensors and actuators. While the deployment of IoT brings value in various aspects of our society, the lucrative reward from cyber-crimes also increases in the upcoming IoT era. Two unique privacy and security concerns are emerging for IoT. On one hand, IoT brings a large volume of new sensors that are deployed ubiquitously and collect data 24/7. User's privacy is a big concern in this circumstance because collected sensor data may be used to infer a user's private activities. On the other hand, cyber-attacks now harm not only cyberspace but also the physical world. A failure in IoT devices could result in loss of human life. For example, a remotely hacked vehicle could shut down its engine on the highway regardless of the driver's operation. Our approach to emerging privacy and security concerns consists of two directions. The first direction targets at privacy protection. We first look at the privacy impact of upcoming ubiquitous sensing and argue for stricter access control on smart devices. Then, we follow the data flow of private data and propose solutions to protect private data from the networking and cloud computing infrastructure. The other direction aims at protecting the physical world. We propose an innovative method to verify the cyber state of IoT devices.
Schulz, Steffen [Verfasser], Vijay [Gutachter] Varadharajan, and Ahmad-Reza [Gutachter] Sadeghi. "Trusted channels and roots of trust in distributed embedded systems / Steffen Schulz ; Gutachter: Vijay Varadharajan, Ahmad-Reza Sadeghi." Bochum : Ruhr-Universität Bochum, 2016. http://d-nb.info/1123283028/34.
Full textDeJong, Ronald Johannes. "A study of covert channels in a trusted UNIX system." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1995. http://handle.dtic.mil/100.2/ADA294396.
Full text"March 1995." Thesis advisor(s): Cynthia E. Irvine, Timothy J. Shimeall. Includes bibliographical references. Also available online.
GROSSO, MONICA. "Analyzing channel relationship complexity: the role of private labels and store trust in channel equilibrium." Doctoral thesis, Università Bocconi, 2012. https://hdl.handle.net/11565/4054257.
Full textBuchanan, Kenneth Owen. "School pupil's perceptions of information channel credibility." Thesis, University of Pretoria, 2016. http://hdl.handle.net/2263/59904.
Full textThesis (PhD)--University of Pretoria, 2016.
Information Science
PhD
Unrestricted
Books on the topic "Trusted channel"
Sherwood, Arthur M. Changes in the New York definition of trust accounting principal and income. Newark, NJ: LexisNexis, 2002.
Find full textElder and Disability Law Conference (5th 2003 Boston, Mass.). Elder & Disability Law Conference, 2003: Keeping up with the MassHealth changes. [Boston, Mass.]: MCLE, 2003.
Find full textGoodman, Isidore. Pending employee benefit changes. Chicago, Ill. (4025 W. Peterson Ave., Chicago 60646): Commerce Clearing House, 1986.
Find full textBroto, Dewo. Blueprint for Indonesia Climate Change Trust Fund (ICCTF). Jakarta: Bappenas, 2009.
Find full textLimited, Extel Financial, ed. Changes of names: Companies and unit trusts. London: Extel Financial., 1990.
Find full textLimited, Extel Financial, ed. Changes of names: Companies and unit trusts. London: compiled, printed and published by Extel Financial Limited, 1992.
Find full textPène, Didier. Retraites, tout bouger pour rien changer. Paris: Milo, 2003.
Find full textGoodman, Isidore. Future changes in employee benefits. Chicago, Ill. (4025 W. Peterson Ave., Chicago 60646): Commerce Clearing House, 1985.
Find full textGuibord, Alan R. IT leadership manual: Roadmap to becoming a trusted business partner. Hoboken, N.J: Wiley, 2012.
Find full textDuarte, Margarida. The role of trust within the behavioural perspective on marketing channels. Manchester: Manchester Business School, 2001.
Find full textBook chapters on the topic "Trusted channel"
Phong, Le Trieu, Shin’ichiro Matsuo, and Moti Yung. "Leakage Resilient Strong Key-Insulated Signatures in Public Channel." In Trusted Systems, 160–72. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-25283-9_11.
Full textGallais, Jean-François, Johann Großschädl, Neil Hanley, Markus Kasper, Marcel Medwed, Francesco Regazzoni, Jörn-Marc Schmidt, Stefan Tillich, and Marcin Wójcik. "Hardware Trojans for Inducing or Amplifying Side-Channel Leakage of Cryptographic Software." In Trusted Systems, 253–70. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-25283-9_17.
Full textNiemi, Arto, Vasile Adrian Bogdan Pop, and Jan-Erik Ekberg. "Trusted Sockets Layer: A TLS 1.3 Based Trusted Channel Protocol." In Secure IT Systems, 175–91. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-91625-1_10.
Full textHeuser, Annelie, Olivier Rioul, Sylvain Guilley, and Jean-Luc Danger. "Information Theoretic Comparison of Side-Channel Distinguishers: Inter-class Distance, Confusion, and Success." In Trusted Computing for Embedded Systems, 187–225. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-09420-5_10.
Full textAkram, Raja Naeem, Konstantinos Markantonakis, Keith Mayes, Pierre-François Bonnefoi, Amina Cherif, Damien Sauveron, and Serge Chaumette. "A Secure and Trusted Channel Protocol for UAVs Fleets." In Information Security Theory and Practice, 3–24. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-93524-9_1.
Full textZhu, Feng, Youngtae Yun, Jinpeng Wei, Brent Byunghoon Kang, Yongzhi Wang, Daehyeok Kim, Peng Li, He Xu, and Ruchuan Wang. "A Reflective Covert Channel Attack Anchored on Trusted Web Services." In Web Services – ICWS 2018, 84–99. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-94289-6_6.
Full textCheng, Yexia, Yuejin Du, Jin Peng, Jun Fu, and Baoxu Liu. "Trusted Secure Accessing Protection Framework Based on Cloud-Channel-Device Cooperation." In Communications in Computer and Information Science, 165–76. Singapore: Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-6621-5_14.
Full textHu, Keke, Xiaohui Zhang, and Yongming Wang. "Secrecy on a Gaussian Relay-Eavesdropper Channel with a Trusted Relay." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 108–25. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-37231-6_6.
Full textBoldrin, Luca, Giovanni Paolo Sellitto, and Jaak Tepandi. "TOOP Trust Architecture." In The Once-Only Principle, 126–40. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-79851-2_7.
Full textSong, Xiangmei, Shiguang Ju, Changda Wang, and Conghua Zhou. "Information Flow Graph: An Approach to Identifying Covert Storage Channels." In Trusted Systems, 87–97. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-25283-9_6.
Full textConference papers on the topic "Trusted channel"
Shen, Jianhua, Hongmei Guo, and Zhengkun Mi. "An Idle-Time Eliminating Channel Transmission Scheme in EPON System." In Trusted Computing (UIC/ATC). IEEE, 2010. http://dx.doi.org/10.1109/uic-atc.2010.80.
Full textJunjie, Mao, Zhang Chongbin, Zhang Baofeng, Guo Ying, Wu Yushu, Xie Shihua, Zhang Xiaofei, and Zhao Shuang. "Firmware of Trusted Channel Based on the Trusted Platform Control Module." In 2013 6th International Conference on Intelligent Networks and Intelligent Systems (ICINIS). IEEE, 2013. http://dx.doi.org/10.1109/icinis.2013.55.
Full textMao Junjie, Guo Ying, Zhang Chongbin, Xu Yuan, Zhang Baofeng, Li Fengjuan, Xie Shihua, and Jiang Wei. "Hardware Layer Trusted Channel Model Based on the Trusted Platform Control Module." In 2012 IEEE/ACIS 11th International Conference on Computer and Information Science (ICIS). IEEE, 2012. http://dx.doi.org/10.1109/icis.2012.57.
Full textSun, Weifeng, Rong Cong, Feng Xia, Xiao Chen, and Zhenquan Qin. "R-CA: A Routing-Based Dynamic Channel Assignment Algorithm in Wireless Mesh Networks." In Trusted Computing (UIC/ATC). IEEE, 2010. http://dx.doi.org/10.1109/uic-atc.2010.5.
Full textLiu, Jian, Fangmin Li, Fei Dou, Xu He, Zhigang Luo, and Hong Xiong. "An Adaptive Cross-Layer Mechanism of Multi-channel Multi-interface Wireless Networks for Real-Time Video Streaming." In Trusted Computing (UIC/ATC). IEEE, 2010. http://dx.doi.org/10.1109/uic-atc.2010.9.
Full textWan, Xin, XinFang Zhang, Liang Chen, and JianXin Zhu. "An improved vTPM migration protocol based trusted channel." In 2012 International Conference on Systems and Informatics (ICSAI). IEEE, 2012. http://dx.doi.org/10.1109/icsai.2012.6223146.
Full textLi, Peng, Xiaofei Luo, Toshiaki Miyazaki, and Song Guo. "Privacy-preserving Payment Channel Networks using Trusted Execution Environment." In ICC 2020 - 2020 IEEE International Conference on Communications (ICC). IEEE, 2020. http://dx.doi.org/10.1109/icc40277.2020.9149447.
Full textXia, Yan, Yingzhi Zeng, Bin Fu, and Zhenghu Gong. "Loop-Based Dynamic Channel Assignment for Multi-radio Multi-channel Wireless Mesh Networks." In 2010 Second International Conference on Networks Security, Wireless Communications and Trusted Computing. IEEE, 2010. http://dx.doi.org/10.1109/nswctc.2010.68.
Full textLi, Kewei, Qingwei Liu, Furong Wang, and Xu Xie. "Joint Optimal Congestion Control and Channel Assignment for Multi-Radio Multi-Channel Wireless Networks in Cyber-Physical Systems." In 2009 Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing. IEEE, 2009. http://dx.doi.org/10.1109/uic-atc.2009.27.
Full textivic, Natasa, Obaidur Ur Rehman, and Christoph Ruland. "Using HMAC for Error Correction over a Wireless Channel." In 2009 Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing. IEEE, 2009. http://dx.doi.org/10.1109/uic-atc.2009.54.
Full textReports on the topic "Trusted channel"
GREATER SAN ANTONIO HOSPITAL COUNCIL TX. A Guide to Understanding Covert Channel Analysis of Trusted Systems. Fort Belvoir, VA: Defense Technical Information Center, November 1993. http://dx.doi.org/10.21236/ada477386.
Full textMcDermott, J. The b2/c3 Problem: How Big Buffers Overcome Covert Channel Cynicism in Trusted Database Systems. Fort Belvoir, VA: Defense Technical Information Center, January 1994. http://dx.doi.org/10.21236/ada465578.
Full textPresseau, Justin, Laura Desveaux, Upton Allen, Trevor Arnason, Judy L. Buchan, Kimberly M. Corace, Vinita Dubey, et al. Behavioural Science Principles for Supporting COVID-19 Vaccine Confidence and Uptake Among Ontario Health Care Workers. Ontario COVID-19 Science Advisory Table, March 2021. http://dx.doi.org/10.47326/ocsat.2021.02.12.1.0.
Full textAlessandro, Martín, Bruno Cardinale Lagomarsino, Carlos Scartascini, and Jerónimo Torrealday. Research Insights: How Can Governments Build Trust? Inter-American Development Bank, February 2021. http://dx.doi.org/10.18235/0003028.
Full textKarns, Christopher P. Combating the Enemy Within: Building Trust, Leading Change and Defeating the Mental Health Stigma. Fort Belvoir, VA: Defense Technical Information Center, December 2013. http://dx.doi.org/10.21236/ad1018817.
Full textVlaicu, Razvan, and Philip Keefer. Employee Trust and Performance Constraints in Public Sector Organizations. Inter-American Development Bank, September 2022. http://dx.doi.org/10.18235/0004456.
Full textKeefer, Philip, and Razvan Vlaicu. Employee Trust and Performance Constraints in Public Sector Organizations. Inter-American Development Bank, December 2022. http://dx.doi.org/10.18235/0004596.
Full textGage, William, and Michelle Sengara. From Radical Disruption to Robust Systems: Change Management for The Evolution of Trust in Higher Education. York University, January 2019. http://dx.doi.org/10.25071/10315/36069.
Full textCarty, Tracy, and Jan Kowalzig. Climate Finance Short-changed: The real value of the $100 billion commitment in 2019–2020. Oxfam, October 2022. http://dx.doi.org/10.21201/2022.9752.
Full textMartinez-Bravo, Monica, and Carlos Sanz. Trust and accountability in times of pandemics. Madrid: Banco de España, January 2023. http://dx.doi.org/10.53479/29471.
Full text