Literatura académica sobre el tema "Trusted channel"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "Trusted channel".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Artículos de revistas sobre el tema "Trusted channel"
Dawei, Zhang, Han Zhen, Jiang Yichen, Du Ye y Li Meihong. "Protocol for trusted channel based on portable trusted module". China Communications 10, n.º 11 (noviembre de 2013): 1–14. http://dx.doi.org/10.1109/cc.2013.6674205.
Texto completoMa, Jun, Zhi Ying Wang, Jiang Chun Ren, Jiang Jiang Wu, Yong Cheng y Song Zhu Mei. "Dynamic Trusted Domain: Preventing Data Leakage of Trusted Subjects". Applied Mechanics and Materials 48-49 (febrero de 2011): 470–73. http://dx.doi.org/10.4028/www.scientific.net/amm.48-49.470.
Texto completoDobele, Angela, Jane Fry, Sharyn Rundle-Thiele y Tim Fry. "Caring for baby: what sources of information do mothers use and trust?" Journal of Services Marketing 31, n.º 7 (9 de octubre de 2017): 677–89. http://dx.doi.org/10.1108/jsm-02-2015-0104.
Texto completoJang, Jinsoo y Brent Byunghoon Kang. "Securing a communication channel for the trusted execution environment". Computers & Security 83 (junio de 2019): 79–92. http://dx.doi.org/10.1016/j.cose.2019.01.012.
Texto completoLiu, Hongbin, Han Zhou, Hao Chen, Yong Yan, Jianping Huang, Ao Xiong, Shaojie Yang, Jiewei Chen y Shaoyong Guo. "A Federated Learning Multi-Task Scheduling Mechanism Based on Trusted Computing Sandbox". Sensors 23, n.º 4 (13 de febrero de 2023): 2093. http://dx.doi.org/10.3390/s23042093.
Texto completoEl-Badry, Rania, Moustafa Youssef y Ahmed Sultan. "Hidden Anchor: A Lightweight Approach for Physical Layer Location Privacy". Journal of Computer Systems, Networks, and Communications 2010 (2010): 1–12. http://dx.doi.org/10.1155/2010/749298.
Texto completoLi, Xinyao y Akhilesh Tyagi. "Cross-World Covert Channel on ARM Trustzone through PMU". Sensors 22, n.º 19 (28 de septiembre de 2022): 7354. http://dx.doi.org/10.3390/s22197354.
Texto completoMa, Wei, Xiaoyong Li, Congdong Lv y Fei Li. "An Architectural Refinement Approach Based on Trusted Channel in MLS Environment". Open Automation and Control Systems Journal 6, n.º 1 (31 de diciembre de 2014): 1862–69. http://dx.doi.org/10.2174/1874444301406011862.
Texto completoFairchild, Alea M. "What is the Role of Third Party Logistics (3PL) Partners in an Omni-Channel Strategy?" International Journal of Operations Research and Information Systems 7, n.º 1 (enero de 2016): 22–32. http://dx.doi.org/10.4018/ijoris.2016010102.
Texto completoWang, Zhe, Hui Wang, Yuning Yang, Dejian Li, Zhe Zhang y Tiantian Wu. "The research of the side-channel analysis method based on deep learning for trusted platform module". Journal of Physics: Conference Series 2358, n.º 1 (1 de octubre de 2022): 012016. http://dx.doi.org/10.1088/1742-6596/2358/1/012016.
Texto completoTesis sobre el tema "Trusted channel"
Moukarzel, Michael A. "µLeech: A Side-Channel Evaluation Platform for Next Generation Trusted Embedded Systems". Digital WPI, 2015. https://digitalcommons.wpi.edu/etd-theses/1034.
Texto completoLantz, David. "Detection of side-channel attacks targeting Intel SGX". Thesis, Linköpings universitet, Programvara och system, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-177987.
Texto completoReid, Jason Frederick. "Enhancing security in distributed systems with trusted computing hardware". Thesis, Queensland University of Technology, 2007. https://eprints.qut.edu.au/16379/1/Jason_Reid_Thesis.pdf.
Texto completoReid, Jason Frederick. "Enhancing security in distributed systems with trusted computing hardware". Queensland University of Technology, 2007. http://eprints.qut.edu.au/16379/.
Texto completoMoghimi, Ahmad. "Side-Channel Attacks on Intel SGX: How SGX Amplifies The Power of Cache Attack". Digital WPI, 2017. https://digitalcommons.wpi.edu/etd-theses/399.
Texto completoZhang, Ruide. "Hardware-Aided Privacy Protection and Cyber Defense for IoT". Diss., Virginia Tech, 2020. http://hdl.handle.net/10919/98791.
Texto completoDoctor of Philosophy
The past few years have witnessed a rising in computing and networking technologies. Such advances enable the new paradigm, IoT, which brings great convenience to people's life. Large technology companies like Google, Apple, Amazon are creating smart devices such as smartwatch, smart home, drones, etc. Compared to the traditional internet, IoT can provide services beyond digital information by interacting with the physical world by its sensors and actuators. While the deployment of IoT brings value in various aspects of our society, the lucrative reward from cyber-crimes also increases in the upcoming IoT era. Two unique privacy and security concerns are emerging for IoT. On one hand, IoT brings a large volume of new sensors that are deployed ubiquitously and collect data 24/7. User's privacy is a big concern in this circumstance because collected sensor data may be used to infer a user's private activities. On the other hand, cyber-attacks now harm not only cyberspace but also the physical world. A failure in IoT devices could result in loss of human life. For example, a remotely hacked vehicle could shut down its engine on the highway regardless of the driver's operation. Our approach to emerging privacy and security concerns consists of two directions. The first direction targets at privacy protection. We first look at the privacy impact of upcoming ubiquitous sensing and argue for stricter access control on smart devices. Then, we follow the data flow of private data and propose solutions to protect private data from the networking and cloud computing infrastructure. The other direction aims at protecting the physical world. We propose an innovative method to verify the cyber state of IoT devices.
Schulz, Steffen [Verfasser], Vijay [Gutachter] Varadharajan y Ahmad-Reza [Gutachter] Sadeghi. "Trusted channels and roots of trust in distributed embedded systems / Steffen Schulz ; Gutachter: Vijay Varadharajan, Ahmad-Reza Sadeghi". Bochum : Ruhr-Universität Bochum, 2016. http://d-nb.info/1123283028/34.
Texto completoDeJong, Ronald Johannes. "A study of covert channels in a trusted UNIX system". Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1995. http://handle.dtic.mil/100.2/ADA294396.
Texto completo"March 1995." Thesis advisor(s): Cynthia E. Irvine, Timothy J. Shimeall. Includes bibliographical references. Also available online.
GROSSO, MONICA. "Analyzing channel relationship complexity: the role of private labels and store trust in channel equilibrium". Doctoral thesis, Università Bocconi, 2012. https://hdl.handle.net/11565/4054257.
Texto completoBuchanan, Kenneth Owen. "School pupil's perceptions of information channel credibility". Thesis, University of Pretoria, 2016. http://hdl.handle.net/2263/59904.
Texto completoThesis (PhD)--University of Pretoria, 2016.
Information Science
PhD
Unrestricted
Libros sobre el tema "Trusted channel"
Sherwood, Arthur M. Changes in the New York definition of trust accounting principal and income. Newark, NJ: LexisNexis, 2002.
Buscar texto completoElder and Disability Law Conference (5th 2003 Boston, Mass.). Elder & Disability Law Conference, 2003: Keeping up with the MassHealth changes. [Boston, Mass.]: MCLE, 2003.
Buscar texto completoGoodman, Isidore. Pending employee benefit changes. Chicago, Ill. (4025 W. Peterson Ave., Chicago 60646): Commerce Clearing House, 1986.
Buscar texto completoBroto, Dewo. Blueprint for Indonesia Climate Change Trust Fund (ICCTF). Jakarta: Bappenas, 2009.
Buscar texto completoLimited, Extel Financial, ed. Changes of names: Companies and unit trusts. London: Extel Financial., 1990.
Buscar texto completoLimited, Extel Financial, ed. Changes of names: Companies and unit trusts. London: compiled, printed and published by Extel Financial Limited, 1992.
Buscar texto completoPène, Didier. Retraites, tout bouger pour rien changer. Paris: Milo, 2003.
Buscar texto completoGoodman, Isidore. Future changes in employee benefits. Chicago, Ill. (4025 W. Peterson Ave., Chicago 60646): Commerce Clearing House, 1985.
Buscar texto completoGuibord, Alan R. IT leadership manual: Roadmap to becoming a trusted business partner. Hoboken, N.J: Wiley, 2012.
Buscar texto completoDuarte, Margarida. The role of trust within the behavioural perspective on marketing channels. Manchester: Manchester Business School, 2001.
Buscar texto completoCapítulos de libros sobre el tema "Trusted channel"
Phong, Le Trieu, Shin’ichiro Matsuo y Moti Yung. "Leakage Resilient Strong Key-Insulated Signatures in Public Channel". En Trusted Systems, 160–72. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-25283-9_11.
Texto completoGallais, Jean-François, Johann Großschädl, Neil Hanley, Markus Kasper, Marcel Medwed, Francesco Regazzoni, Jörn-Marc Schmidt, Stefan Tillich y Marcin Wójcik. "Hardware Trojans for Inducing or Amplifying Side-Channel Leakage of Cryptographic Software". En Trusted Systems, 253–70. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-25283-9_17.
Texto completoNiemi, Arto, Vasile Adrian Bogdan Pop y Jan-Erik Ekberg. "Trusted Sockets Layer: A TLS 1.3 Based Trusted Channel Protocol". En Secure IT Systems, 175–91. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-91625-1_10.
Texto completoHeuser, Annelie, Olivier Rioul, Sylvain Guilley y Jean-Luc Danger. "Information Theoretic Comparison of Side-Channel Distinguishers: Inter-class Distance, Confusion, and Success". En Trusted Computing for Embedded Systems, 187–225. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-09420-5_10.
Texto completoAkram, Raja Naeem, Konstantinos Markantonakis, Keith Mayes, Pierre-François Bonnefoi, Amina Cherif, Damien Sauveron y Serge Chaumette. "A Secure and Trusted Channel Protocol for UAVs Fleets". En Information Security Theory and Practice, 3–24. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-93524-9_1.
Texto completoZhu, Feng, Youngtae Yun, Jinpeng Wei, Brent Byunghoon Kang, Yongzhi Wang, Daehyeok Kim, Peng Li, He Xu y Ruchuan Wang. "A Reflective Covert Channel Attack Anchored on Trusted Web Services". En Web Services – ICWS 2018, 84–99. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-94289-6_6.
Texto completoCheng, Yexia, Yuejin Du, Jin Peng, Jun Fu y Baoxu Liu. "Trusted Secure Accessing Protection Framework Based on Cloud-Channel-Device Cooperation". En Communications in Computer and Information Science, 165–76. Singapore: Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-6621-5_14.
Texto completoHu, Keke, Xiaohui Zhang y Yongming Wang. "Secrecy on a Gaussian Relay-Eavesdropper Channel with a Trusted Relay". En Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 108–25. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-37231-6_6.
Texto completoBoldrin, Luca, Giovanni Paolo Sellitto y Jaak Tepandi. "TOOP Trust Architecture". En The Once-Only Principle, 126–40. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-79851-2_7.
Texto completoSong, Xiangmei, Shiguang Ju, Changda Wang y Conghua Zhou. "Information Flow Graph: An Approach to Identifying Covert Storage Channels". En Trusted Systems, 87–97. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-25283-9_6.
Texto completoActas de conferencias sobre el tema "Trusted channel"
Shen, Jianhua, Hongmei Guo y Zhengkun Mi. "An Idle-Time Eliminating Channel Transmission Scheme in EPON System". En Trusted Computing (UIC/ATC). IEEE, 2010. http://dx.doi.org/10.1109/uic-atc.2010.80.
Texto completoJunjie, Mao, Zhang Chongbin, Zhang Baofeng, Guo Ying, Wu Yushu, Xie Shihua, Zhang Xiaofei y Zhao Shuang. "Firmware of Trusted Channel Based on the Trusted Platform Control Module". En 2013 6th International Conference on Intelligent Networks and Intelligent Systems (ICINIS). IEEE, 2013. http://dx.doi.org/10.1109/icinis.2013.55.
Texto completoMao Junjie, Guo Ying, Zhang Chongbin, Xu Yuan, Zhang Baofeng, Li Fengjuan, Xie Shihua y Jiang Wei. "Hardware Layer Trusted Channel Model Based on the Trusted Platform Control Module". En 2012 IEEE/ACIS 11th International Conference on Computer and Information Science (ICIS). IEEE, 2012. http://dx.doi.org/10.1109/icis.2012.57.
Texto completoSun, Weifeng, Rong Cong, Feng Xia, Xiao Chen y Zhenquan Qin. "R-CA: A Routing-Based Dynamic Channel Assignment Algorithm in Wireless Mesh Networks". En Trusted Computing (UIC/ATC). IEEE, 2010. http://dx.doi.org/10.1109/uic-atc.2010.5.
Texto completoLiu, Jian, Fangmin Li, Fei Dou, Xu He, Zhigang Luo y Hong Xiong. "An Adaptive Cross-Layer Mechanism of Multi-channel Multi-interface Wireless Networks for Real-Time Video Streaming". En Trusted Computing (UIC/ATC). IEEE, 2010. http://dx.doi.org/10.1109/uic-atc.2010.9.
Texto completoWan, Xin, XinFang Zhang, Liang Chen y JianXin Zhu. "An improved vTPM migration protocol based trusted channel". En 2012 International Conference on Systems and Informatics (ICSAI). IEEE, 2012. http://dx.doi.org/10.1109/icsai.2012.6223146.
Texto completoLi, Peng, Xiaofei Luo, Toshiaki Miyazaki y Song Guo. "Privacy-preserving Payment Channel Networks using Trusted Execution Environment". En ICC 2020 - 2020 IEEE International Conference on Communications (ICC). IEEE, 2020. http://dx.doi.org/10.1109/icc40277.2020.9149447.
Texto completoXia, Yan, Yingzhi Zeng, Bin Fu y Zhenghu Gong. "Loop-Based Dynamic Channel Assignment for Multi-radio Multi-channel Wireless Mesh Networks". En 2010 Second International Conference on Networks Security, Wireless Communications and Trusted Computing. IEEE, 2010. http://dx.doi.org/10.1109/nswctc.2010.68.
Texto completoLi, Kewei, Qingwei Liu, Furong Wang y Xu Xie. "Joint Optimal Congestion Control and Channel Assignment for Multi-Radio Multi-Channel Wireless Networks in Cyber-Physical Systems". En 2009 Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing. IEEE, 2009. http://dx.doi.org/10.1109/uic-atc.2009.27.
Texto completoivic, Natasa, Obaidur Ur Rehman y Christoph Ruland. "Using HMAC for Error Correction over a Wireless Channel". En 2009 Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing. IEEE, 2009. http://dx.doi.org/10.1109/uic-atc.2009.54.
Texto completoInformes sobre el tema "Trusted channel"
GREATER SAN ANTONIO HOSPITAL COUNCIL TX. A Guide to Understanding Covert Channel Analysis of Trusted Systems. Fort Belvoir, VA: Defense Technical Information Center, noviembre de 1993. http://dx.doi.org/10.21236/ada477386.
Texto completoMcDermott, J. The b2/c3 Problem: How Big Buffers Overcome Covert Channel Cynicism in Trusted Database Systems. Fort Belvoir, VA: Defense Technical Information Center, enero de 1994. http://dx.doi.org/10.21236/ada465578.
Texto completoPresseau, Justin, Laura Desveaux, Upton Allen, Trevor Arnason, Judy L. Buchan, Kimberly M. Corace, Vinita Dubey et al. Behavioural Science Principles for Supporting COVID-19 Vaccine Confidence and Uptake Among Ontario Health Care Workers. Ontario COVID-19 Science Advisory Table, marzo de 2021. http://dx.doi.org/10.47326/ocsat.2021.02.12.1.0.
Texto completoAlessandro, Martín, Bruno Cardinale Lagomarsino, Carlos Scartascini y Jerónimo Torrealday. Research Insights: How Can Governments Build Trust? Inter-American Development Bank, febrero de 2021. http://dx.doi.org/10.18235/0003028.
Texto completoKarns, Christopher P. Combating the Enemy Within: Building Trust, Leading Change and Defeating the Mental Health Stigma. Fort Belvoir, VA: Defense Technical Information Center, diciembre de 2013. http://dx.doi.org/10.21236/ad1018817.
Texto completoVlaicu, Razvan y Philip Keefer. Employee Trust and Performance Constraints in Public Sector Organizations. Inter-American Development Bank, septiembre de 2022. http://dx.doi.org/10.18235/0004456.
Texto completoKeefer, Philip y Razvan Vlaicu. Employee Trust and Performance Constraints in Public Sector Organizations. Inter-American Development Bank, diciembre de 2022. http://dx.doi.org/10.18235/0004596.
Texto completoGage, William y Michelle Sengara. From Radical Disruption to Robust Systems: Change Management for The Evolution of Trust in Higher Education. York University, enero de 2019. http://dx.doi.org/10.25071/10315/36069.
Texto completoCarty, Tracy y Jan Kowalzig. Climate Finance Short-changed: The real value of the $100 billion commitment in 2019–2020. Oxfam, octubre de 2022. http://dx.doi.org/10.21201/2022.9752.
Texto completoMartinez-Bravo, Monica y Carlos Sanz. Trust and accountability in times of pandemics. Madrid: Banco de España, enero de 2023. http://dx.doi.org/10.53479/29471.
Texto completo