Добірка наукової літератури з теми "Trusted channel"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Trusted channel".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "Trusted channel"
Dawei, Zhang, Han Zhen, Jiang Yichen, Du Ye, and Li Meihong. "Protocol for trusted channel based on portable trusted module." China Communications 10, no. 11 (November 2013): 1–14. http://dx.doi.org/10.1109/cc.2013.6674205.
Повний текст джерелаMa, Jun, Zhi Ying Wang, Jiang Chun Ren, Jiang Jiang Wu, Yong Cheng, and Song Zhu Mei. "Dynamic Trusted Domain: Preventing Data Leakage of Trusted Subjects." Applied Mechanics and Materials 48-49 (February 2011): 470–73. http://dx.doi.org/10.4028/www.scientific.net/amm.48-49.470.
Повний текст джерелаDobele, Angela, Jane Fry, Sharyn Rundle-Thiele, and Tim Fry. "Caring for baby: what sources of information do mothers use and trust?" Journal of Services Marketing 31, no. 7 (October 9, 2017): 677–89. http://dx.doi.org/10.1108/jsm-02-2015-0104.
Повний текст джерелаJang, Jinsoo, and Brent Byunghoon Kang. "Securing a communication channel for the trusted execution environment." Computers & Security 83 (June 2019): 79–92. http://dx.doi.org/10.1016/j.cose.2019.01.012.
Повний текст джерелаLiu, Hongbin, Han Zhou, Hao Chen, Yong Yan, Jianping Huang, Ao Xiong, Shaojie Yang, Jiewei Chen, and Shaoyong Guo. "A Federated Learning Multi-Task Scheduling Mechanism Based on Trusted Computing Sandbox." Sensors 23, no. 4 (February 13, 2023): 2093. http://dx.doi.org/10.3390/s23042093.
Повний текст джерелаEl-Badry, Rania, Moustafa Youssef, and Ahmed Sultan. "Hidden Anchor: A Lightweight Approach for Physical Layer Location Privacy." Journal of Computer Systems, Networks, and Communications 2010 (2010): 1–12. http://dx.doi.org/10.1155/2010/749298.
Повний текст джерелаLi, Xinyao, and Akhilesh Tyagi. "Cross-World Covert Channel on ARM Trustzone through PMU." Sensors 22, no. 19 (September 28, 2022): 7354. http://dx.doi.org/10.3390/s22197354.
Повний текст джерелаMa, Wei, Xiaoyong Li, Congdong Lv, and Fei Li. "An Architectural Refinement Approach Based on Trusted Channel in MLS Environment." Open Automation and Control Systems Journal 6, no. 1 (December 31, 2014): 1862–69. http://dx.doi.org/10.2174/1874444301406011862.
Повний текст джерелаFairchild, Alea M. "What is the Role of Third Party Logistics (3PL) Partners in an Omni-Channel Strategy?" International Journal of Operations Research and Information Systems 7, no. 1 (January 2016): 22–32. http://dx.doi.org/10.4018/ijoris.2016010102.
Повний текст джерелаWang, Zhe, Hui Wang, Yuning Yang, Dejian Li, Zhe Zhang, and Tiantian Wu. "The research of the side-channel analysis method based on deep learning for trusted platform module." Journal of Physics: Conference Series 2358, no. 1 (October 1, 2022): 012016. http://dx.doi.org/10.1088/1742-6596/2358/1/012016.
Повний текст джерелаДисертації з теми "Trusted channel"
Moukarzel, Michael A. "µLeech: A Side-Channel Evaluation Platform for Next Generation Trusted Embedded Systems." Digital WPI, 2015. https://digitalcommons.wpi.edu/etd-theses/1034.
Повний текст джерелаLantz, David. "Detection of side-channel attacks targeting Intel SGX." Thesis, Linköpings universitet, Programvara och system, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-177987.
Повний текст джерелаReid, Jason Frederick. "Enhancing security in distributed systems with trusted computing hardware." Thesis, Queensland University of Technology, 2007. https://eprints.qut.edu.au/16379/1/Jason_Reid_Thesis.pdf.
Повний текст джерелаReid, Jason Frederick. "Enhancing security in distributed systems with trusted computing hardware." Queensland University of Technology, 2007. http://eprints.qut.edu.au/16379/.
Повний текст джерелаMoghimi, Ahmad. "Side-Channel Attacks on Intel SGX: How SGX Amplifies The Power of Cache Attack." Digital WPI, 2017. https://digitalcommons.wpi.edu/etd-theses/399.
Повний текст джерелаZhang, Ruide. "Hardware-Aided Privacy Protection and Cyber Defense for IoT." Diss., Virginia Tech, 2020. http://hdl.handle.net/10919/98791.
Повний текст джерелаDoctor of Philosophy
The past few years have witnessed a rising in computing and networking technologies. Such advances enable the new paradigm, IoT, which brings great convenience to people's life. Large technology companies like Google, Apple, Amazon are creating smart devices such as smartwatch, smart home, drones, etc. Compared to the traditional internet, IoT can provide services beyond digital information by interacting with the physical world by its sensors and actuators. While the deployment of IoT brings value in various aspects of our society, the lucrative reward from cyber-crimes also increases in the upcoming IoT era. Two unique privacy and security concerns are emerging for IoT. On one hand, IoT brings a large volume of new sensors that are deployed ubiquitously and collect data 24/7. User's privacy is a big concern in this circumstance because collected sensor data may be used to infer a user's private activities. On the other hand, cyber-attacks now harm not only cyberspace but also the physical world. A failure in IoT devices could result in loss of human life. For example, a remotely hacked vehicle could shut down its engine on the highway regardless of the driver's operation. Our approach to emerging privacy and security concerns consists of two directions. The first direction targets at privacy protection. We first look at the privacy impact of upcoming ubiquitous sensing and argue for stricter access control on smart devices. Then, we follow the data flow of private data and propose solutions to protect private data from the networking and cloud computing infrastructure. The other direction aims at protecting the physical world. We propose an innovative method to verify the cyber state of IoT devices.
Schulz, Steffen [Verfasser], Vijay [Gutachter] Varadharajan, and Ahmad-Reza [Gutachter] Sadeghi. "Trusted channels and roots of trust in distributed embedded systems / Steffen Schulz ; Gutachter: Vijay Varadharajan, Ahmad-Reza Sadeghi." Bochum : Ruhr-Universität Bochum, 2016. http://d-nb.info/1123283028/34.
Повний текст джерелаDeJong, Ronald Johannes. "A study of covert channels in a trusted UNIX system." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1995. http://handle.dtic.mil/100.2/ADA294396.
Повний текст джерела"March 1995." Thesis advisor(s): Cynthia E. Irvine, Timothy J. Shimeall. Includes bibliographical references. Also available online.
GROSSO, MONICA. "Analyzing channel relationship complexity: the role of private labels and store trust in channel equilibrium." Doctoral thesis, Università Bocconi, 2012. https://hdl.handle.net/11565/4054257.
Повний текст джерелаBuchanan, Kenneth Owen. "School pupil's perceptions of information channel credibility." Thesis, University of Pretoria, 2016. http://hdl.handle.net/2263/59904.
Повний текст джерелаThesis (PhD)--University of Pretoria, 2016.
Information Science
PhD
Unrestricted
Книги з теми "Trusted channel"
Sherwood, Arthur M. Changes in the New York definition of trust accounting principal and income. Newark, NJ: LexisNexis, 2002.
Знайти повний текст джерелаElder and Disability Law Conference (5th 2003 Boston, Mass.). Elder & Disability Law Conference, 2003: Keeping up with the MassHealth changes. [Boston, Mass.]: MCLE, 2003.
Знайти повний текст джерелаGoodman, Isidore. Pending employee benefit changes. Chicago, Ill. (4025 W. Peterson Ave., Chicago 60646): Commerce Clearing House, 1986.
Знайти повний текст джерелаBroto, Dewo. Blueprint for Indonesia Climate Change Trust Fund (ICCTF). Jakarta: Bappenas, 2009.
Знайти повний текст джерелаLimited, Extel Financial, ed. Changes of names: Companies and unit trusts. London: Extel Financial., 1990.
Знайти повний текст джерелаLimited, Extel Financial, ed. Changes of names: Companies and unit trusts. London: compiled, printed and published by Extel Financial Limited, 1992.
Знайти повний текст джерелаPène, Didier. Retraites, tout bouger pour rien changer. Paris: Milo, 2003.
Знайти повний текст джерелаGoodman, Isidore. Future changes in employee benefits. Chicago, Ill. (4025 W. Peterson Ave., Chicago 60646): Commerce Clearing House, 1985.
Знайти повний текст джерелаGuibord, Alan R. IT leadership manual: Roadmap to becoming a trusted business partner. Hoboken, N.J: Wiley, 2012.
Знайти повний текст джерелаDuarte, Margarida. The role of trust within the behavioural perspective on marketing channels. Manchester: Manchester Business School, 2001.
Знайти повний текст джерелаЧастини книг з теми "Trusted channel"
Phong, Le Trieu, Shin’ichiro Matsuo, and Moti Yung. "Leakage Resilient Strong Key-Insulated Signatures in Public Channel." In Trusted Systems, 160–72. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-25283-9_11.
Повний текст джерелаGallais, Jean-François, Johann Großschädl, Neil Hanley, Markus Kasper, Marcel Medwed, Francesco Regazzoni, Jörn-Marc Schmidt, Stefan Tillich, and Marcin Wójcik. "Hardware Trojans for Inducing or Amplifying Side-Channel Leakage of Cryptographic Software." In Trusted Systems, 253–70. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-25283-9_17.
Повний текст джерелаNiemi, Arto, Vasile Adrian Bogdan Pop, and Jan-Erik Ekberg. "Trusted Sockets Layer: A TLS 1.3 Based Trusted Channel Protocol." In Secure IT Systems, 175–91. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-91625-1_10.
Повний текст джерелаHeuser, Annelie, Olivier Rioul, Sylvain Guilley, and Jean-Luc Danger. "Information Theoretic Comparison of Side-Channel Distinguishers: Inter-class Distance, Confusion, and Success." In Trusted Computing for Embedded Systems, 187–225. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-09420-5_10.
Повний текст джерелаAkram, Raja Naeem, Konstantinos Markantonakis, Keith Mayes, Pierre-François Bonnefoi, Amina Cherif, Damien Sauveron, and Serge Chaumette. "A Secure and Trusted Channel Protocol for UAVs Fleets." In Information Security Theory and Practice, 3–24. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-93524-9_1.
Повний текст джерелаZhu, Feng, Youngtae Yun, Jinpeng Wei, Brent Byunghoon Kang, Yongzhi Wang, Daehyeok Kim, Peng Li, He Xu, and Ruchuan Wang. "A Reflective Covert Channel Attack Anchored on Trusted Web Services." In Web Services – ICWS 2018, 84–99. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-94289-6_6.
Повний текст джерелаCheng, Yexia, Yuejin Du, Jin Peng, Jun Fu, and Baoxu Liu. "Trusted Secure Accessing Protection Framework Based on Cloud-Channel-Device Cooperation." In Communications in Computer and Information Science, 165–76. Singapore: Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-6621-5_14.
Повний текст джерелаHu, Keke, Xiaohui Zhang, and Yongming Wang. "Secrecy on a Gaussian Relay-Eavesdropper Channel with a Trusted Relay." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 108–25. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-37231-6_6.
Повний текст джерелаBoldrin, Luca, Giovanni Paolo Sellitto, and Jaak Tepandi. "TOOP Trust Architecture." In The Once-Only Principle, 126–40. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-79851-2_7.
Повний текст джерелаSong, Xiangmei, Shiguang Ju, Changda Wang, and Conghua Zhou. "Information Flow Graph: An Approach to Identifying Covert Storage Channels." In Trusted Systems, 87–97. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-25283-9_6.
Повний текст джерелаТези доповідей конференцій з теми "Trusted channel"
Shen, Jianhua, Hongmei Guo, and Zhengkun Mi. "An Idle-Time Eliminating Channel Transmission Scheme in EPON System." In Trusted Computing (UIC/ATC). IEEE, 2010. http://dx.doi.org/10.1109/uic-atc.2010.80.
Повний текст джерелаJunjie, Mao, Zhang Chongbin, Zhang Baofeng, Guo Ying, Wu Yushu, Xie Shihua, Zhang Xiaofei, and Zhao Shuang. "Firmware of Trusted Channel Based on the Trusted Platform Control Module." In 2013 6th International Conference on Intelligent Networks and Intelligent Systems (ICINIS). IEEE, 2013. http://dx.doi.org/10.1109/icinis.2013.55.
Повний текст джерелаMao Junjie, Guo Ying, Zhang Chongbin, Xu Yuan, Zhang Baofeng, Li Fengjuan, Xie Shihua, and Jiang Wei. "Hardware Layer Trusted Channel Model Based on the Trusted Platform Control Module." In 2012 IEEE/ACIS 11th International Conference on Computer and Information Science (ICIS). IEEE, 2012. http://dx.doi.org/10.1109/icis.2012.57.
Повний текст джерелаSun, Weifeng, Rong Cong, Feng Xia, Xiao Chen, and Zhenquan Qin. "R-CA: A Routing-Based Dynamic Channel Assignment Algorithm in Wireless Mesh Networks." In Trusted Computing (UIC/ATC). IEEE, 2010. http://dx.doi.org/10.1109/uic-atc.2010.5.
Повний текст джерелаLiu, Jian, Fangmin Li, Fei Dou, Xu He, Zhigang Luo, and Hong Xiong. "An Adaptive Cross-Layer Mechanism of Multi-channel Multi-interface Wireless Networks for Real-Time Video Streaming." In Trusted Computing (UIC/ATC). IEEE, 2010. http://dx.doi.org/10.1109/uic-atc.2010.9.
Повний текст джерелаWan, Xin, XinFang Zhang, Liang Chen, and JianXin Zhu. "An improved vTPM migration protocol based trusted channel." In 2012 International Conference on Systems and Informatics (ICSAI). IEEE, 2012. http://dx.doi.org/10.1109/icsai.2012.6223146.
Повний текст джерелаLi, Peng, Xiaofei Luo, Toshiaki Miyazaki, and Song Guo. "Privacy-preserving Payment Channel Networks using Trusted Execution Environment." In ICC 2020 - 2020 IEEE International Conference on Communications (ICC). IEEE, 2020. http://dx.doi.org/10.1109/icc40277.2020.9149447.
Повний текст джерелаXia, Yan, Yingzhi Zeng, Bin Fu, and Zhenghu Gong. "Loop-Based Dynamic Channel Assignment for Multi-radio Multi-channel Wireless Mesh Networks." In 2010 Second International Conference on Networks Security, Wireless Communications and Trusted Computing. IEEE, 2010. http://dx.doi.org/10.1109/nswctc.2010.68.
Повний текст джерелаLi, Kewei, Qingwei Liu, Furong Wang, and Xu Xie. "Joint Optimal Congestion Control and Channel Assignment for Multi-Radio Multi-Channel Wireless Networks in Cyber-Physical Systems." In 2009 Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing. IEEE, 2009. http://dx.doi.org/10.1109/uic-atc.2009.27.
Повний текст джерелаivic, Natasa, Obaidur Ur Rehman, and Christoph Ruland. "Using HMAC for Error Correction over a Wireless Channel." In 2009 Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing. IEEE, 2009. http://dx.doi.org/10.1109/uic-atc.2009.54.
Повний текст джерелаЗвіти організацій з теми "Trusted channel"
GREATER SAN ANTONIO HOSPITAL COUNCIL TX. A Guide to Understanding Covert Channel Analysis of Trusted Systems. Fort Belvoir, VA: Defense Technical Information Center, November 1993. http://dx.doi.org/10.21236/ada477386.
Повний текст джерелаMcDermott, J. The b2/c3 Problem: How Big Buffers Overcome Covert Channel Cynicism in Trusted Database Systems. Fort Belvoir, VA: Defense Technical Information Center, January 1994. http://dx.doi.org/10.21236/ada465578.
Повний текст джерелаPresseau, Justin, Laura Desveaux, Upton Allen, Trevor Arnason, Judy L. Buchan, Kimberly M. Corace, Vinita Dubey, et al. Behavioural Science Principles for Supporting COVID-19 Vaccine Confidence and Uptake Among Ontario Health Care Workers. Ontario COVID-19 Science Advisory Table, March 2021. http://dx.doi.org/10.47326/ocsat.2021.02.12.1.0.
Повний текст джерелаAlessandro, Martín, Bruno Cardinale Lagomarsino, Carlos Scartascini, and Jerónimo Torrealday. Research Insights: How Can Governments Build Trust? Inter-American Development Bank, February 2021. http://dx.doi.org/10.18235/0003028.
Повний текст джерелаKarns, Christopher P. Combating the Enemy Within: Building Trust, Leading Change and Defeating the Mental Health Stigma. Fort Belvoir, VA: Defense Technical Information Center, December 2013. http://dx.doi.org/10.21236/ad1018817.
Повний текст джерелаVlaicu, Razvan, and Philip Keefer. Employee Trust and Performance Constraints in Public Sector Organizations. Inter-American Development Bank, September 2022. http://dx.doi.org/10.18235/0004456.
Повний текст джерелаKeefer, Philip, and Razvan Vlaicu. Employee Trust and Performance Constraints in Public Sector Organizations. Inter-American Development Bank, December 2022. http://dx.doi.org/10.18235/0004596.
Повний текст джерелаGage, William, and Michelle Sengara. From Radical Disruption to Robust Systems: Change Management for The Evolution of Trust in Higher Education. York University, January 2019. http://dx.doi.org/10.25071/10315/36069.
Повний текст джерелаCarty, Tracy, and Jan Kowalzig. Climate Finance Short-changed: The real value of the $100 billion commitment in 2019–2020. Oxfam, October 2022. http://dx.doi.org/10.21201/2022.9752.
Повний текст джерелаMartinez-Bravo, Monica, and Carlos Sanz. Trust and accountability in times of pandemics. Madrid: Banco de España, January 2023. http://dx.doi.org/10.53479/29471.
Повний текст джерела