Artículos de revistas sobre el tema "Trusted channel"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "Trusted channel".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Dawei, Zhang, Han Zhen, Jiang Yichen, Du Ye y Li Meihong. "Protocol for trusted channel based on portable trusted module". China Communications 10, n.º 11 (noviembre de 2013): 1–14. http://dx.doi.org/10.1109/cc.2013.6674205.
Texto completoMa, Jun, Zhi Ying Wang, Jiang Chun Ren, Jiang Jiang Wu, Yong Cheng y Song Zhu Mei. "Dynamic Trusted Domain: Preventing Data Leakage of Trusted Subjects". Applied Mechanics and Materials 48-49 (febrero de 2011): 470–73. http://dx.doi.org/10.4028/www.scientific.net/amm.48-49.470.
Texto completoDobele, Angela, Jane Fry, Sharyn Rundle-Thiele y Tim Fry. "Caring for baby: what sources of information do mothers use and trust?" Journal of Services Marketing 31, n.º 7 (9 de octubre de 2017): 677–89. http://dx.doi.org/10.1108/jsm-02-2015-0104.
Texto completoJang, Jinsoo y Brent Byunghoon Kang. "Securing a communication channel for the trusted execution environment". Computers & Security 83 (junio de 2019): 79–92. http://dx.doi.org/10.1016/j.cose.2019.01.012.
Texto completoLiu, Hongbin, Han Zhou, Hao Chen, Yong Yan, Jianping Huang, Ao Xiong, Shaojie Yang, Jiewei Chen y Shaoyong Guo. "A Federated Learning Multi-Task Scheduling Mechanism Based on Trusted Computing Sandbox". Sensors 23, n.º 4 (13 de febrero de 2023): 2093. http://dx.doi.org/10.3390/s23042093.
Texto completoEl-Badry, Rania, Moustafa Youssef y Ahmed Sultan. "Hidden Anchor: A Lightweight Approach for Physical Layer Location Privacy". Journal of Computer Systems, Networks, and Communications 2010 (2010): 1–12. http://dx.doi.org/10.1155/2010/749298.
Texto completoLi, Xinyao y Akhilesh Tyagi. "Cross-World Covert Channel on ARM Trustzone through PMU". Sensors 22, n.º 19 (28 de septiembre de 2022): 7354. http://dx.doi.org/10.3390/s22197354.
Texto completoMa, Wei, Xiaoyong Li, Congdong Lv y Fei Li. "An Architectural Refinement Approach Based on Trusted Channel in MLS Environment". Open Automation and Control Systems Journal 6, n.º 1 (31 de diciembre de 2014): 1862–69. http://dx.doi.org/10.2174/1874444301406011862.
Texto completoFairchild, Alea M. "What is the Role of Third Party Logistics (3PL) Partners in an Omni-Channel Strategy?" International Journal of Operations Research and Information Systems 7, n.º 1 (enero de 2016): 22–32. http://dx.doi.org/10.4018/ijoris.2016010102.
Texto completoWang, Zhe, Hui Wang, Yuning Yang, Dejian Li, Zhe Zhang y Tiantian Wu. "The research of the side-channel analysis method based on deep learning for trusted platform module". Journal of Physics: Conference Series 2358, n.º 1 (1 de octubre de 2022): 012016. http://dx.doi.org/10.1088/1742-6596/2358/1/012016.
Texto completoMANDAL, PARTHA SARATHI y ANIL K. GHOSH. "A STATISTICAL APPROACH TOWARDS SECURE LOCATION VERIFICATION IN NOISY WIRELESS CHANNELS". International Journal of Foundations of Computer Science 25, n.º 05 (agosto de 2014): 563–84. http://dx.doi.org/10.1142/s0129054114500221.
Texto completoWANG, Haixiang, Jingyi CAO y Zhe LIU. "Energy Internet and Its Trusted Protection Architecture". Wuhan University Journal of Natural Sciences 27, n.º 2 (abril de 2022): 169–76. http://dx.doi.org/10.1051/wujns/2022272169.
Texto completoShah, Syed Luqman, Irshad Ahmed Abbasi, Alwalid Bashier Gism Elseed, Sikandar Ali, Zahid Anwar, Qasim Rajpoot y Maria Riaz. "TAMEC: Trusted Augmented Mobile Execution on Cloud". Scientific Programming 2021 (8 de marzo de 2021): 1–8. http://dx.doi.org/10.1155/2021/5542852.
Texto completoCLARKSON, MICHAEL R. y FRED B. SCHNEIDER. "Quantification of integrity". Mathematical Structures in Computer Science 25, n.º 2 (10 de noviembre de 2014): 207–58. http://dx.doi.org/10.1017/s0960129513000595.
Texto completoDeeptha, R. y Rajeswari Mukesh. "Extending OpenID Connect Towards Mission Critical Applications". Cybernetics and Information Technologies 18, n.º 3 (1 de septiembre de 2018): 93–110. http://dx.doi.org/10.2478/cait-2018-0041.
Texto completoJiang, Nanlan, Sai Yang y Pingping Xu. "Enabling Location Privacy Preservation in MANETs Based on Distance, Angle, and Spatial Cloaking". Electronics 9, n.º 3 (8 de marzo de 2020): 458. http://dx.doi.org/10.3390/electronics9030458.
Texto completoAlder, Fritz, Jo Van Bulck, Jesse Spielman, David Oswald y Frank Piessens. "Faulty Point Unit: ABI Poisoning Attacks on Trusted Execution Environments". Digital Threats: Research and Practice 3, n.º 2 (30 de junio de 2022): 1–26. http://dx.doi.org/10.1145/3491264.
Texto completoLuo, Ya y Yang Li. "A Method of Software Requirement Optimization and Selection Based on AGORA Extended Model". Advanced Materials Research 271-273 (julio de 2011): 1124–29. http://dx.doi.org/10.4028/www.scientific.net/amr.271-273.1124.
Texto completoPham, Thu Anh y Ngoc T. Dang. "Relay-Assisted Satellite QKD Systems using MMW Radio-over-FSO for Vehicular Networks". Journal of Science and Technology: Issue on Information and Communications Technology 18, n.º 12.2 (29 de diciembre de 2020): 31. http://dx.doi.org/10.31130/ict-ud.2020.109.
Texto completoAhmet Kurt, Suat Mercan, Enes Erdin y Kemal Akkaya. "3-of-3 multisignature approach for enabling lightning network micro-payments on IoT devices". ITU Journal on Future and Evolving Technologies 2, n.º 5 (23 de julio de 2021): 53–67. http://dx.doi.org/10.52953/wzpc8083.
Texto completoYang, Yun, Lie Wu, Chen Wang y Hong Ai. "Research on Security Access and Authentication Technology of Power Terminal Based on TNC". Applied Mechanics and Materials 494-495 (febrero de 2014): 1623–26. http://dx.doi.org/10.4028/www.scientific.net/amm.494-495.1623.
Texto completoRyu, Jong Yeol y Jung Hoon Lee. "Trust Degree-Based MISO Cooperative Communications with Two Relay Nodes". Wireless Communications and Mobile Computing 2019 (1 de enero de 2019): 1–13. http://dx.doi.org/10.1155/2019/7927358.
Texto completoFarhi, Nitzan, Nir Nissim y Yuval Elovici. "Malboard: A novel user keystroke impersonation attack and trusted detection framework based on side-channel analysis". Computers & Security 85 (agosto de 2019): 240–69. http://dx.doi.org/10.1016/j.cose.2019.05.008.
Texto completoAnnadurai, Soorya y Bhargav J. Bhatkalkar. "Secure Multiparty Device Pairing Using Random Peephole Generations". Journal of Computational and Theoretical Nanoscience 17, n.º 1 (1 de enero de 2020): 216–21. http://dx.doi.org/10.1166/jctn.2020.8653.
Texto completoHa, Yun-Sok, Kwang Taek Kim, Wook Nam, Hongzoo Park, Sangjun Yoo, Chan Ho Lee, Ho Seok Chung et al. "Investigation of Information Acquisition Channel for Prostate Cancer High-Risk Group". Korean Journal of Urological Oncology 19, n.º 3 (31 de agosto de 2021): 174–82. http://dx.doi.org/10.22465/kjuo.2021.19.3.174.
Texto completoLiu, Qiao, Guang Gong, Yong Wang y Hui Li. "A Novel Secure Transmission Scheme in MIMO Two-Way Relay Channels with Physical Layer Approach". Mobile Information Systems 2017 (2017): 1–12. http://dx.doi.org/10.1155/2017/7843843.
Texto completoFischer, Andreas, Benny Fuhry, Jörn Kußmaul, Jonas Janneck, Florian Kerschbaum y Eric Bodden. "Computation on Encrypted Data Using Dataflow Authentication". ACM Transactions on Privacy and Security 25, n.º 3 (31 de agosto de 2022): 1–36. http://dx.doi.org/10.1145/3513005.
Texto completoM, Priyatharishini y M. Nirmala Devi. "A compressive sensing algorithm for hardware trojan detection". International Journal of Electrical and Computer Engineering (IJECE) 9, n.º 5 (1 de octubre de 2019): 4035. http://dx.doi.org/10.11591/ijece.v9i5.pp4035-4043.
Texto completoŠKORIĆ, BORIS. "Quantum readout of Physical Unclonable Functions". International Journal of Quantum Information 10, n.º 01 (febrero de 2012): 1250001. http://dx.doi.org/10.1142/s0219749912500013.
Texto completoHopfer, Suellen, Huong T. Duong, Samantha Garcia y Sora P. Tanjasiri. "Health Information Source Characteristics Matter: Adapting the Dissemination of an HPV Vaccine Intervention to Reach Latina and Vietnamese Women". Journal of Primary Prevention 42, n.º 5 (20 de julio de 2021): 511–29. http://dx.doi.org/10.1007/s10935-021-00643-2.
Texto completoFischer, Andreas, Benny Fuhry, Florian Kerschbaum y Eric Bodden. "Computation on Encrypted Data using Dataflow Authentication". Proceedings on Privacy Enhancing Technologies 2020, n.º 1 (1 de enero de 2020): 5–25. http://dx.doi.org/10.2478/popets-2020-0002.
Texto completoCao, Wen-Fei, Yi-Zheng Zhen, Yu-Lin Zheng, Shuai Zhao, Feihu Xu, Li Li, Zeng-Bing Chen, Nai-Le Liu y Kai Chen. "Open-Destination Measurement-Device-Independent Quantum Key Distribution Network". Entropy 22, n.º 10 (26 de septiembre de 2020): 1083. http://dx.doi.org/10.3390/e22101083.
Texto completoSattar, Zina. "A Practical E-Test System". International Journal of Emerging Technologies in Learning (iJET) 14, n.º 21 (18 de noviembre de 2019): 110. http://dx.doi.org/10.3991/ijet.v14i21.10866.
Texto completoMolotkov, S. N. "On the robustness of information-theoretic authentication in quantum cryptography". Laser Physics Letters 19, n.º 7 (19 de mayo de 2022): 075203. http://dx.doi.org/10.1088/1612-202x/ac6a60.
Texto completoWimpenny, Gareth, Jan Šafář, Alan Grant y Martin Bransby. "Securing the Automatic Identification System (AIS): Using public key cryptography to prevent spoofing whilst retaining backwards compatibility". Journal of Navigation 75, n.º 2 (14 de diciembre de 2021): 333–45. http://dx.doi.org/10.1017/s0373463321000837.
Texto completoChen, Yi, Hong Wen, Jinsong Wu, Huanhuan Song, Aidong Xu, Yixin Jiang, Tengyue Zhang y Zhen Wang. "Clustering Based Physical-Layer Authentication in Edge Computing Systems with Asymmetric Resources". Sensors 19, n.º 8 (24 de abril de 2019): 1926. http://dx.doi.org/10.3390/s19081926.
Texto completoKarabacak, Fatih, Umit Ogras y Sule Ozev. "Malicious Activity Detection in Lightweight Wearable and IoT Devices Using Signal Stitching". Sensors 21, n.º 10 (13 de mayo de 2021): 3408. http://dx.doi.org/10.3390/s21103408.
Texto completoPrema Sindhuri, B. y M. Kameswara Rao. "IoT security through web application firewall". International Journal of Engineering & Technology 7, n.º 2.7 (18 de marzo de 2018): 58. http://dx.doi.org/10.14419/ijet.v7i2.7.10259.
Texto completoANDRÉS, MIGUEL E., CATUSCIA PALAMIDESSI y GEOFFREY SMITH. "Preface to the special issue on quantitative information flow". Mathematical Structures in Computer Science 25, n.º 2 (10 de noviembre de 2014): 203–6. http://dx.doi.org/10.1017/s0960129513000583.
Texto completoCrowe, David y Wasim Al-Hamdani. "Retained-Key Encryption". International Journal of Interdisciplinary Telecommunications and Networking 5, n.º 2 (abril de 2013): 1–17. http://dx.doi.org/10.4018/jitn.2013040101.
Texto completoShah, Shakir-Ullah, Jamil Ahmad y Najeeb-ur Rehman. "Design and Implementation of Inter-operable and Secure Agent Migration Protocol". International Arab Journal of Information Technology 17, n.º 4 (1 de julio de 2020): 461–70. http://dx.doi.org/10.34028/iajit/17/4/4.
Texto completoGebert-Persson, Sabine, Mikael Gidhagen, James E. Sallis y Heléne Lundberg. "Online insurance claims: when more than trust matters". International Journal of Bank Marketing 37, n.º 2 (1 de abril de 2019): 579–94. http://dx.doi.org/10.1108/ijbm-02-2018-0024.
Texto completoBouida, Zied, Athanasios Stavridis, Ali Ghrayeb, Harald Haas, Mazen Hasna y Mohamed Ibnkahla. "Precoding-Aided Spatial Modulation for the Wiretap Channel with Relay Selection and Cooperative Jamming". Wireless Communications and Mobile Computing 2018 (5 de agosto de 2018): 1–11. http://dx.doi.org/10.1155/2018/8407297.
Texto completoTang, Chunming, Yuyu Ma y Xiang Yu. "Design and Implementation of Port Video Terminals Security Access Authentication System Using Blockchain Technology". E3S Web of Conferences 253 (2021): 03086. http://dx.doi.org/10.1051/e3sconf/202125303086.
Texto completoHieu, Le Quang y Nguyen Thi Loan. "Determinants of Gen Z Online Buying Behavior: A Quantitative Research". Asian Journal of Applied Science and Technology 06, n.º 02 (2022): 36–48. http://dx.doi.org/10.38177/ajast.2022.6206.
Texto completoWiese, Moritz y Holger Boche. "Mosaics of combinatorial designs for information-theoretic security". Designs, Codes and Cryptography 90, n.º 3 (5 de enero de 2022): 593–632. http://dx.doi.org/10.1007/s10623-021-00994-1.
Texto completoGupta, Manik, Rakesh Kumar, Shashi Shekhar, Bhisham Sharma, Ram Bahadur Patel, Shaily Jain, Imed Ben Dhaou y Celestine Iwendi. "Game Theory-Based Authentication Framework to Secure Internet of Vehicles with Blockchain". Sensors 22, n.º 14 (7 de julio de 2022): 5119. http://dx.doi.org/10.3390/s22145119.
Texto completoChien, Hung-Yu y Nian-Zu Wang. "A Novel MQTT 5.0-Based Over-the-Air Updating Architecture Facilitating Stronger Security". Electronics 11, n.º 23 (25 de noviembre de 2022): 3899. http://dx.doi.org/10.3390/electronics11233899.
Texto completoMukherjee, Jaydeep. "Managing Sales Team at Balram Beverages". Vision: The Journal of Business Perspective 21, n.º 4 (30 de noviembre de 2017): 473–78. http://dx.doi.org/10.1177/0972262917733196.
Texto completoShliakhtina, E. A. y D. Y. Gamayunov. "GROUP AUTHENTICATION SCHEME BASED ON ZERO-KNOWLEDGE PROOF". Prikladnaya Diskretnaya Matematika, n.º 51 (2021): 68–84. http://dx.doi.org/10.17223/20710410/51/3.
Texto completo