Journal articles on the topic 'Trusted channel'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Trusted channel.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Dawei, Zhang, Han Zhen, Jiang Yichen, Du Ye, and Li Meihong. "Protocol for trusted channel based on portable trusted module." China Communications 10, no. 11 (November 2013): 1–14. http://dx.doi.org/10.1109/cc.2013.6674205.
Full textMa, Jun, Zhi Ying Wang, Jiang Chun Ren, Jiang Jiang Wu, Yong Cheng, and Song Zhu Mei. "Dynamic Trusted Domain: Preventing Data Leakage of Trusted Subjects." Applied Mechanics and Materials 48-49 (February 2011): 470–73. http://dx.doi.org/10.4028/www.scientific.net/amm.48-49.470.
Full textDobele, Angela, Jane Fry, Sharyn Rundle-Thiele, and Tim Fry. "Caring for baby: what sources of information do mothers use and trust?" Journal of Services Marketing 31, no. 7 (October 9, 2017): 677–89. http://dx.doi.org/10.1108/jsm-02-2015-0104.
Full textJang, Jinsoo, and Brent Byunghoon Kang. "Securing a communication channel for the trusted execution environment." Computers & Security 83 (June 2019): 79–92. http://dx.doi.org/10.1016/j.cose.2019.01.012.
Full textLiu, Hongbin, Han Zhou, Hao Chen, Yong Yan, Jianping Huang, Ao Xiong, Shaojie Yang, Jiewei Chen, and Shaoyong Guo. "A Federated Learning Multi-Task Scheduling Mechanism Based on Trusted Computing Sandbox." Sensors 23, no. 4 (February 13, 2023): 2093. http://dx.doi.org/10.3390/s23042093.
Full textEl-Badry, Rania, Moustafa Youssef, and Ahmed Sultan. "Hidden Anchor: A Lightweight Approach for Physical Layer Location Privacy." Journal of Computer Systems, Networks, and Communications 2010 (2010): 1–12. http://dx.doi.org/10.1155/2010/749298.
Full textLi, Xinyao, and Akhilesh Tyagi. "Cross-World Covert Channel on ARM Trustzone through PMU." Sensors 22, no. 19 (September 28, 2022): 7354. http://dx.doi.org/10.3390/s22197354.
Full textMa, Wei, Xiaoyong Li, Congdong Lv, and Fei Li. "An Architectural Refinement Approach Based on Trusted Channel in MLS Environment." Open Automation and Control Systems Journal 6, no. 1 (December 31, 2014): 1862–69. http://dx.doi.org/10.2174/1874444301406011862.
Full textFairchild, Alea M. "What is the Role of Third Party Logistics (3PL) Partners in an Omni-Channel Strategy?" International Journal of Operations Research and Information Systems 7, no. 1 (January 2016): 22–32. http://dx.doi.org/10.4018/ijoris.2016010102.
Full textWang, Zhe, Hui Wang, Yuning Yang, Dejian Li, Zhe Zhang, and Tiantian Wu. "The research of the side-channel analysis method based on deep learning for trusted platform module." Journal of Physics: Conference Series 2358, no. 1 (October 1, 2022): 012016. http://dx.doi.org/10.1088/1742-6596/2358/1/012016.
Full textMANDAL, PARTHA SARATHI, and ANIL K. GHOSH. "A STATISTICAL APPROACH TOWARDS SECURE LOCATION VERIFICATION IN NOISY WIRELESS CHANNELS." International Journal of Foundations of Computer Science 25, no. 05 (August 2014): 563–84. http://dx.doi.org/10.1142/s0129054114500221.
Full textWANG, Haixiang, Jingyi CAO, and Zhe LIU. "Energy Internet and Its Trusted Protection Architecture." Wuhan University Journal of Natural Sciences 27, no. 2 (April 2022): 169–76. http://dx.doi.org/10.1051/wujns/2022272169.
Full textShah, Syed Luqman, Irshad Ahmed Abbasi, Alwalid Bashier Gism Elseed, Sikandar Ali, Zahid Anwar, Qasim Rajpoot, and Maria Riaz. "TAMEC: Trusted Augmented Mobile Execution on Cloud." Scientific Programming 2021 (March 8, 2021): 1–8. http://dx.doi.org/10.1155/2021/5542852.
Full textCLARKSON, MICHAEL R., and FRED B. SCHNEIDER. "Quantification of integrity." Mathematical Structures in Computer Science 25, no. 2 (November 10, 2014): 207–58. http://dx.doi.org/10.1017/s0960129513000595.
Full textDeeptha, R., and Rajeswari Mukesh. "Extending OpenID Connect Towards Mission Critical Applications." Cybernetics and Information Technologies 18, no. 3 (September 1, 2018): 93–110. http://dx.doi.org/10.2478/cait-2018-0041.
Full textJiang, Nanlan, Sai Yang, and Pingping Xu. "Enabling Location Privacy Preservation in MANETs Based on Distance, Angle, and Spatial Cloaking." Electronics 9, no. 3 (March 8, 2020): 458. http://dx.doi.org/10.3390/electronics9030458.
Full textAlder, Fritz, Jo Van Bulck, Jesse Spielman, David Oswald, and Frank Piessens. "Faulty Point Unit: ABI Poisoning Attacks on Trusted Execution Environments." Digital Threats: Research and Practice 3, no. 2 (June 30, 2022): 1–26. http://dx.doi.org/10.1145/3491264.
Full textLuo, Ya, and Yang Li. "A Method of Software Requirement Optimization and Selection Based on AGORA Extended Model." Advanced Materials Research 271-273 (July 2011): 1124–29. http://dx.doi.org/10.4028/www.scientific.net/amr.271-273.1124.
Full textPham, Thu Anh, and Ngoc T. Dang. "Relay-Assisted Satellite QKD Systems using MMW Radio-over-FSO for Vehicular Networks." Journal of Science and Technology: Issue on Information and Communications Technology 18, no. 12.2 (December 29, 2020): 31. http://dx.doi.org/10.31130/ict-ud.2020.109.
Full textAhmet Kurt, Suat Mercan, Enes Erdin, and Kemal Akkaya. "3-of-3 multisignature approach for enabling lightning network micro-payments on IoT devices." ITU Journal on Future and Evolving Technologies 2, no. 5 (July 23, 2021): 53–67. http://dx.doi.org/10.52953/wzpc8083.
Full textYang, Yun, Lie Wu, Chen Wang, and Hong Ai. "Research on Security Access and Authentication Technology of Power Terminal Based on TNC." Applied Mechanics and Materials 494-495 (February 2014): 1623–26. http://dx.doi.org/10.4028/www.scientific.net/amm.494-495.1623.
Full textRyu, Jong Yeol, and Jung Hoon Lee. "Trust Degree-Based MISO Cooperative Communications with Two Relay Nodes." Wireless Communications and Mobile Computing 2019 (January 1, 2019): 1–13. http://dx.doi.org/10.1155/2019/7927358.
Full textFarhi, Nitzan, Nir Nissim, and Yuval Elovici. "Malboard: A novel user keystroke impersonation attack and trusted detection framework based on side-channel analysis." Computers & Security 85 (August 2019): 240–69. http://dx.doi.org/10.1016/j.cose.2019.05.008.
Full textAnnadurai, Soorya, and Bhargav J. Bhatkalkar. "Secure Multiparty Device Pairing Using Random Peephole Generations." Journal of Computational and Theoretical Nanoscience 17, no. 1 (January 1, 2020): 216–21. http://dx.doi.org/10.1166/jctn.2020.8653.
Full textHa, Yun-Sok, Kwang Taek Kim, Wook Nam, Hongzoo Park, Sangjun Yoo, Chan Ho Lee, Ho Seok Chung, et al. "Investigation of Information Acquisition Channel for Prostate Cancer High-Risk Group." Korean Journal of Urological Oncology 19, no. 3 (August 31, 2021): 174–82. http://dx.doi.org/10.22465/kjuo.2021.19.3.174.
Full textLiu, Qiao, Guang Gong, Yong Wang, and Hui Li. "A Novel Secure Transmission Scheme in MIMO Two-Way Relay Channels with Physical Layer Approach." Mobile Information Systems 2017 (2017): 1–12. http://dx.doi.org/10.1155/2017/7843843.
Full textFischer, Andreas, Benny Fuhry, Jörn Kußmaul, Jonas Janneck, Florian Kerschbaum, and Eric Bodden. "Computation on Encrypted Data Using Dataflow Authentication." ACM Transactions on Privacy and Security 25, no. 3 (August 31, 2022): 1–36. http://dx.doi.org/10.1145/3513005.
Full textM, Priyatharishini, and M. Nirmala Devi. "A compressive sensing algorithm for hardware trojan detection." International Journal of Electrical and Computer Engineering (IJECE) 9, no. 5 (October 1, 2019): 4035. http://dx.doi.org/10.11591/ijece.v9i5.pp4035-4043.
Full textŠKORIĆ, BORIS. "Quantum readout of Physical Unclonable Functions." International Journal of Quantum Information 10, no. 01 (February 2012): 1250001. http://dx.doi.org/10.1142/s0219749912500013.
Full textHopfer, Suellen, Huong T. Duong, Samantha Garcia, and Sora P. Tanjasiri. "Health Information Source Characteristics Matter: Adapting the Dissemination of an HPV Vaccine Intervention to Reach Latina and Vietnamese Women." Journal of Primary Prevention 42, no. 5 (July 20, 2021): 511–29. http://dx.doi.org/10.1007/s10935-021-00643-2.
Full textFischer, Andreas, Benny Fuhry, Florian Kerschbaum, and Eric Bodden. "Computation on Encrypted Data using Dataflow Authentication." Proceedings on Privacy Enhancing Technologies 2020, no. 1 (January 1, 2020): 5–25. http://dx.doi.org/10.2478/popets-2020-0002.
Full textCao, Wen-Fei, Yi-Zheng Zhen, Yu-Lin Zheng, Shuai Zhao, Feihu Xu, Li Li, Zeng-Bing Chen, Nai-Le Liu, and Kai Chen. "Open-Destination Measurement-Device-Independent Quantum Key Distribution Network." Entropy 22, no. 10 (September 26, 2020): 1083. http://dx.doi.org/10.3390/e22101083.
Full textSattar, Zina. "A Practical E-Test System." International Journal of Emerging Technologies in Learning (iJET) 14, no. 21 (November 18, 2019): 110. http://dx.doi.org/10.3991/ijet.v14i21.10866.
Full textMolotkov, S. N. "On the robustness of information-theoretic authentication in quantum cryptography." Laser Physics Letters 19, no. 7 (May 19, 2022): 075203. http://dx.doi.org/10.1088/1612-202x/ac6a60.
Full textWimpenny, Gareth, Jan Šafář, Alan Grant, and Martin Bransby. "Securing the Automatic Identification System (AIS): Using public key cryptography to prevent spoofing whilst retaining backwards compatibility." Journal of Navigation 75, no. 2 (December 14, 2021): 333–45. http://dx.doi.org/10.1017/s0373463321000837.
Full textChen, Yi, Hong Wen, Jinsong Wu, Huanhuan Song, Aidong Xu, Yixin Jiang, Tengyue Zhang, and Zhen Wang. "Clustering Based Physical-Layer Authentication in Edge Computing Systems with Asymmetric Resources." Sensors 19, no. 8 (April 24, 2019): 1926. http://dx.doi.org/10.3390/s19081926.
Full textKarabacak, Fatih, Umit Ogras, and Sule Ozev. "Malicious Activity Detection in Lightweight Wearable and IoT Devices Using Signal Stitching." Sensors 21, no. 10 (May 13, 2021): 3408. http://dx.doi.org/10.3390/s21103408.
Full textPrema Sindhuri, B., and M. Kameswara Rao. "IoT security through web application firewall." International Journal of Engineering & Technology 7, no. 2.7 (March 18, 2018): 58. http://dx.doi.org/10.14419/ijet.v7i2.7.10259.
Full textANDRÉS, MIGUEL E., CATUSCIA PALAMIDESSI, and GEOFFREY SMITH. "Preface to the special issue on quantitative information flow." Mathematical Structures in Computer Science 25, no. 2 (November 10, 2014): 203–6. http://dx.doi.org/10.1017/s0960129513000583.
Full textCrowe, David, and Wasim Al-Hamdani. "Retained-Key Encryption." International Journal of Interdisciplinary Telecommunications and Networking 5, no. 2 (April 2013): 1–17. http://dx.doi.org/10.4018/jitn.2013040101.
Full textShah, Shakir-Ullah, Jamil Ahmad, and Najeeb-ur Rehman. "Design and Implementation of Inter-operable and Secure Agent Migration Protocol." International Arab Journal of Information Technology 17, no. 4 (July 1, 2020): 461–70. http://dx.doi.org/10.34028/iajit/17/4/4.
Full textGebert-Persson, Sabine, Mikael Gidhagen, James E. Sallis, and Heléne Lundberg. "Online insurance claims: when more than trust matters." International Journal of Bank Marketing 37, no. 2 (April 1, 2019): 579–94. http://dx.doi.org/10.1108/ijbm-02-2018-0024.
Full textBouida, Zied, Athanasios Stavridis, Ali Ghrayeb, Harald Haas, Mazen Hasna, and Mohamed Ibnkahla. "Precoding-Aided Spatial Modulation for the Wiretap Channel with Relay Selection and Cooperative Jamming." Wireless Communications and Mobile Computing 2018 (August 5, 2018): 1–11. http://dx.doi.org/10.1155/2018/8407297.
Full textTang, Chunming, Yuyu Ma, and Xiang Yu. "Design and Implementation of Port Video Terminals Security Access Authentication System Using Blockchain Technology." E3S Web of Conferences 253 (2021): 03086. http://dx.doi.org/10.1051/e3sconf/202125303086.
Full textHieu, Le Quang, and Nguyen Thi Loan. "Determinants of Gen Z Online Buying Behavior: A Quantitative Research." Asian Journal of Applied Science and Technology 06, no. 02 (2022): 36–48. http://dx.doi.org/10.38177/ajast.2022.6206.
Full textWiese, Moritz, and Holger Boche. "Mosaics of combinatorial designs for information-theoretic security." Designs, Codes and Cryptography 90, no. 3 (January 5, 2022): 593–632. http://dx.doi.org/10.1007/s10623-021-00994-1.
Full textGupta, Manik, Rakesh Kumar, Shashi Shekhar, Bhisham Sharma, Ram Bahadur Patel, Shaily Jain, Imed Ben Dhaou, and Celestine Iwendi. "Game Theory-Based Authentication Framework to Secure Internet of Vehicles with Blockchain." Sensors 22, no. 14 (July 7, 2022): 5119. http://dx.doi.org/10.3390/s22145119.
Full textChien, Hung-Yu, and Nian-Zu Wang. "A Novel MQTT 5.0-Based Over-the-Air Updating Architecture Facilitating Stronger Security." Electronics 11, no. 23 (November 25, 2022): 3899. http://dx.doi.org/10.3390/electronics11233899.
Full textMukherjee, Jaydeep. "Managing Sales Team at Balram Beverages." Vision: The Journal of Business Perspective 21, no. 4 (November 30, 2017): 473–78. http://dx.doi.org/10.1177/0972262917733196.
Full textShliakhtina, E. A., and D. Y. Gamayunov. "GROUP AUTHENTICATION SCHEME BASED ON ZERO-KNOWLEDGE PROOF." Prikladnaya Diskretnaya Matematika, no. 51 (2021): 68–84. http://dx.doi.org/10.17223/20710410/51/3.
Full text