Статті в журналах з теми "Trusted channel"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Trusted channel".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.
Dawei, Zhang, Han Zhen, Jiang Yichen, Du Ye, and Li Meihong. "Protocol for trusted channel based on portable trusted module." China Communications 10, no. 11 (November 2013): 1–14. http://dx.doi.org/10.1109/cc.2013.6674205.
Повний текст джерелаMa, Jun, Zhi Ying Wang, Jiang Chun Ren, Jiang Jiang Wu, Yong Cheng, and Song Zhu Mei. "Dynamic Trusted Domain: Preventing Data Leakage of Trusted Subjects." Applied Mechanics and Materials 48-49 (February 2011): 470–73. http://dx.doi.org/10.4028/www.scientific.net/amm.48-49.470.
Повний текст джерелаDobele, Angela, Jane Fry, Sharyn Rundle-Thiele, and Tim Fry. "Caring for baby: what sources of information do mothers use and trust?" Journal of Services Marketing 31, no. 7 (October 9, 2017): 677–89. http://dx.doi.org/10.1108/jsm-02-2015-0104.
Повний текст джерелаJang, Jinsoo, and Brent Byunghoon Kang. "Securing a communication channel for the trusted execution environment." Computers & Security 83 (June 2019): 79–92. http://dx.doi.org/10.1016/j.cose.2019.01.012.
Повний текст джерелаLiu, Hongbin, Han Zhou, Hao Chen, Yong Yan, Jianping Huang, Ao Xiong, Shaojie Yang, Jiewei Chen, and Shaoyong Guo. "A Federated Learning Multi-Task Scheduling Mechanism Based on Trusted Computing Sandbox." Sensors 23, no. 4 (February 13, 2023): 2093. http://dx.doi.org/10.3390/s23042093.
Повний текст джерелаEl-Badry, Rania, Moustafa Youssef, and Ahmed Sultan. "Hidden Anchor: A Lightweight Approach for Physical Layer Location Privacy." Journal of Computer Systems, Networks, and Communications 2010 (2010): 1–12. http://dx.doi.org/10.1155/2010/749298.
Повний текст джерелаLi, Xinyao, and Akhilesh Tyagi. "Cross-World Covert Channel on ARM Trustzone through PMU." Sensors 22, no. 19 (September 28, 2022): 7354. http://dx.doi.org/10.3390/s22197354.
Повний текст джерелаMa, Wei, Xiaoyong Li, Congdong Lv, and Fei Li. "An Architectural Refinement Approach Based on Trusted Channel in MLS Environment." Open Automation and Control Systems Journal 6, no. 1 (December 31, 2014): 1862–69. http://dx.doi.org/10.2174/1874444301406011862.
Повний текст джерелаFairchild, Alea M. "What is the Role of Third Party Logistics (3PL) Partners in an Omni-Channel Strategy?" International Journal of Operations Research and Information Systems 7, no. 1 (January 2016): 22–32. http://dx.doi.org/10.4018/ijoris.2016010102.
Повний текст джерелаWang, Zhe, Hui Wang, Yuning Yang, Dejian Li, Zhe Zhang, and Tiantian Wu. "The research of the side-channel analysis method based on deep learning for trusted platform module." Journal of Physics: Conference Series 2358, no. 1 (October 1, 2022): 012016. http://dx.doi.org/10.1088/1742-6596/2358/1/012016.
Повний текст джерелаMANDAL, PARTHA SARATHI, and ANIL K. GHOSH. "A STATISTICAL APPROACH TOWARDS SECURE LOCATION VERIFICATION IN NOISY WIRELESS CHANNELS." International Journal of Foundations of Computer Science 25, no. 05 (August 2014): 563–84. http://dx.doi.org/10.1142/s0129054114500221.
Повний текст джерелаWANG, Haixiang, Jingyi CAO, and Zhe LIU. "Energy Internet and Its Trusted Protection Architecture." Wuhan University Journal of Natural Sciences 27, no. 2 (April 2022): 169–76. http://dx.doi.org/10.1051/wujns/2022272169.
Повний текст джерелаShah, Syed Luqman, Irshad Ahmed Abbasi, Alwalid Bashier Gism Elseed, Sikandar Ali, Zahid Anwar, Qasim Rajpoot, and Maria Riaz. "TAMEC: Trusted Augmented Mobile Execution on Cloud." Scientific Programming 2021 (March 8, 2021): 1–8. http://dx.doi.org/10.1155/2021/5542852.
Повний текст джерелаCLARKSON, MICHAEL R., and FRED B. SCHNEIDER. "Quantification of integrity." Mathematical Structures in Computer Science 25, no. 2 (November 10, 2014): 207–58. http://dx.doi.org/10.1017/s0960129513000595.
Повний текст джерелаDeeptha, R., and Rajeswari Mukesh. "Extending OpenID Connect Towards Mission Critical Applications." Cybernetics and Information Technologies 18, no. 3 (September 1, 2018): 93–110. http://dx.doi.org/10.2478/cait-2018-0041.
Повний текст джерелаJiang, Nanlan, Sai Yang, and Pingping Xu. "Enabling Location Privacy Preservation in MANETs Based on Distance, Angle, and Spatial Cloaking." Electronics 9, no. 3 (March 8, 2020): 458. http://dx.doi.org/10.3390/electronics9030458.
Повний текст джерелаAlder, Fritz, Jo Van Bulck, Jesse Spielman, David Oswald, and Frank Piessens. "Faulty Point Unit: ABI Poisoning Attacks on Trusted Execution Environments." Digital Threats: Research and Practice 3, no. 2 (June 30, 2022): 1–26. http://dx.doi.org/10.1145/3491264.
Повний текст джерелаLuo, Ya, and Yang Li. "A Method of Software Requirement Optimization and Selection Based on AGORA Extended Model." Advanced Materials Research 271-273 (July 2011): 1124–29. http://dx.doi.org/10.4028/www.scientific.net/amr.271-273.1124.
Повний текст джерелаPham, Thu Anh, and Ngoc T. Dang. "Relay-Assisted Satellite QKD Systems using MMW Radio-over-FSO for Vehicular Networks." Journal of Science and Technology: Issue on Information and Communications Technology 18, no. 12.2 (December 29, 2020): 31. http://dx.doi.org/10.31130/ict-ud.2020.109.
Повний текст джерелаAhmet Kurt, Suat Mercan, Enes Erdin, and Kemal Akkaya. "3-of-3 multisignature approach for enabling lightning network micro-payments on IoT devices." ITU Journal on Future and Evolving Technologies 2, no. 5 (July 23, 2021): 53–67. http://dx.doi.org/10.52953/wzpc8083.
Повний текст джерелаYang, Yun, Lie Wu, Chen Wang, and Hong Ai. "Research on Security Access and Authentication Technology of Power Terminal Based on TNC." Applied Mechanics and Materials 494-495 (February 2014): 1623–26. http://dx.doi.org/10.4028/www.scientific.net/amm.494-495.1623.
Повний текст джерелаRyu, Jong Yeol, and Jung Hoon Lee. "Trust Degree-Based MISO Cooperative Communications with Two Relay Nodes." Wireless Communications and Mobile Computing 2019 (January 1, 2019): 1–13. http://dx.doi.org/10.1155/2019/7927358.
Повний текст джерелаFarhi, Nitzan, Nir Nissim, and Yuval Elovici. "Malboard: A novel user keystroke impersonation attack and trusted detection framework based on side-channel analysis." Computers & Security 85 (August 2019): 240–69. http://dx.doi.org/10.1016/j.cose.2019.05.008.
Повний текст джерелаAnnadurai, Soorya, and Bhargav J. Bhatkalkar. "Secure Multiparty Device Pairing Using Random Peephole Generations." Journal of Computational and Theoretical Nanoscience 17, no. 1 (January 1, 2020): 216–21. http://dx.doi.org/10.1166/jctn.2020.8653.
Повний текст джерелаHa, Yun-Sok, Kwang Taek Kim, Wook Nam, Hongzoo Park, Sangjun Yoo, Chan Ho Lee, Ho Seok Chung, et al. "Investigation of Information Acquisition Channel for Prostate Cancer High-Risk Group." Korean Journal of Urological Oncology 19, no. 3 (August 31, 2021): 174–82. http://dx.doi.org/10.22465/kjuo.2021.19.3.174.
Повний текст джерелаLiu, Qiao, Guang Gong, Yong Wang, and Hui Li. "A Novel Secure Transmission Scheme in MIMO Two-Way Relay Channels with Physical Layer Approach." Mobile Information Systems 2017 (2017): 1–12. http://dx.doi.org/10.1155/2017/7843843.
Повний текст джерелаFischer, Andreas, Benny Fuhry, Jörn Kußmaul, Jonas Janneck, Florian Kerschbaum, and Eric Bodden. "Computation on Encrypted Data Using Dataflow Authentication." ACM Transactions on Privacy and Security 25, no. 3 (August 31, 2022): 1–36. http://dx.doi.org/10.1145/3513005.
Повний текст джерелаM, Priyatharishini, and M. Nirmala Devi. "A compressive sensing algorithm for hardware trojan detection." International Journal of Electrical and Computer Engineering (IJECE) 9, no. 5 (October 1, 2019): 4035. http://dx.doi.org/10.11591/ijece.v9i5.pp4035-4043.
Повний текст джерелаŠKORIĆ, BORIS. "Quantum readout of Physical Unclonable Functions." International Journal of Quantum Information 10, no. 01 (February 2012): 1250001. http://dx.doi.org/10.1142/s0219749912500013.
Повний текст джерелаHopfer, Suellen, Huong T. Duong, Samantha Garcia, and Sora P. Tanjasiri. "Health Information Source Characteristics Matter: Adapting the Dissemination of an HPV Vaccine Intervention to Reach Latina and Vietnamese Women." Journal of Primary Prevention 42, no. 5 (July 20, 2021): 511–29. http://dx.doi.org/10.1007/s10935-021-00643-2.
Повний текст джерелаFischer, Andreas, Benny Fuhry, Florian Kerschbaum, and Eric Bodden. "Computation on Encrypted Data using Dataflow Authentication." Proceedings on Privacy Enhancing Technologies 2020, no. 1 (January 1, 2020): 5–25. http://dx.doi.org/10.2478/popets-2020-0002.
Повний текст джерелаCao, Wen-Fei, Yi-Zheng Zhen, Yu-Lin Zheng, Shuai Zhao, Feihu Xu, Li Li, Zeng-Bing Chen, Nai-Le Liu, and Kai Chen. "Open-Destination Measurement-Device-Independent Quantum Key Distribution Network." Entropy 22, no. 10 (September 26, 2020): 1083. http://dx.doi.org/10.3390/e22101083.
Повний текст джерелаSattar, Zina. "A Practical E-Test System." International Journal of Emerging Technologies in Learning (iJET) 14, no. 21 (November 18, 2019): 110. http://dx.doi.org/10.3991/ijet.v14i21.10866.
Повний текст джерелаMolotkov, S. N. "On the robustness of information-theoretic authentication in quantum cryptography." Laser Physics Letters 19, no. 7 (May 19, 2022): 075203. http://dx.doi.org/10.1088/1612-202x/ac6a60.
Повний текст джерелаWimpenny, Gareth, Jan Šafář, Alan Grant, and Martin Bransby. "Securing the Automatic Identification System (AIS): Using public key cryptography to prevent spoofing whilst retaining backwards compatibility." Journal of Navigation 75, no. 2 (December 14, 2021): 333–45. http://dx.doi.org/10.1017/s0373463321000837.
Повний текст джерелаChen, Yi, Hong Wen, Jinsong Wu, Huanhuan Song, Aidong Xu, Yixin Jiang, Tengyue Zhang, and Zhen Wang. "Clustering Based Physical-Layer Authentication in Edge Computing Systems with Asymmetric Resources." Sensors 19, no. 8 (April 24, 2019): 1926. http://dx.doi.org/10.3390/s19081926.
Повний текст джерелаKarabacak, Fatih, Umit Ogras, and Sule Ozev. "Malicious Activity Detection in Lightweight Wearable and IoT Devices Using Signal Stitching." Sensors 21, no. 10 (May 13, 2021): 3408. http://dx.doi.org/10.3390/s21103408.
Повний текст джерелаPrema Sindhuri, B., and M. Kameswara Rao. "IoT security through web application firewall." International Journal of Engineering & Technology 7, no. 2.7 (March 18, 2018): 58. http://dx.doi.org/10.14419/ijet.v7i2.7.10259.
Повний текст джерелаANDRÉS, MIGUEL E., CATUSCIA PALAMIDESSI, and GEOFFREY SMITH. "Preface to the special issue on quantitative information flow." Mathematical Structures in Computer Science 25, no. 2 (November 10, 2014): 203–6. http://dx.doi.org/10.1017/s0960129513000583.
Повний текст джерелаCrowe, David, and Wasim Al-Hamdani. "Retained-Key Encryption." International Journal of Interdisciplinary Telecommunications and Networking 5, no. 2 (April 2013): 1–17. http://dx.doi.org/10.4018/jitn.2013040101.
Повний текст джерелаShah, Shakir-Ullah, Jamil Ahmad, and Najeeb-ur Rehman. "Design and Implementation of Inter-operable and Secure Agent Migration Protocol." International Arab Journal of Information Technology 17, no. 4 (July 1, 2020): 461–70. http://dx.doi.org/10.34028/iajit/17/4/4.
Повний текст джерелаGebert-Persson, Sabine, Mikael Gidhagen, James E. Sallis, and Heléne Lundberg. "Online insurance claims: when more than trust matters." International Journal of Bank Marketing 37, no. 2 (April 1, 2019): 579–94. http://dx.doi.org/10.1108/ijbm-02-2018-0024.
Повний текст джерелаBouida, Zied, Athanasios Stavridis, Ali Ghrayeb, Harald Haas, Mazen Hasna, and Mohamed Ibnkahla. "Precoding-Aided Spatial Modulation for the Wiretap Channel with Relay Selection and Cooperative Jamming." Wireless Communications and Mobile Computing 2018 (August 5, 2018): 1–11. http://dx.doi.org/10.1155/2018/8407297.
Повний текст джерелаTang, Chunming, Yuyu Ma, and Xiang Yu. "Design and Implementation of Port Video Terminals Security Access Authentication System Using Blockchain Technology." E3S Web of Conferences 253 (2021): 03086. http://dx.doi.org/10.1051/e3sconf/202125303086.
Повний текст джерелаHieu, Le Quang, and Nguyen Thi Loan. "Determinants of Gen Z Online Buying Behavior: A Quantitative Research." Asian Journal of Applied Science and Technology 06, no. 02 (2022): 36–48. http://dx.doi.org/10.38177/ajast.2022.6206.
Повний текст джерелаWiese, Moritz, and Holger Boche. "Mosaics of combinatorial designs for information-theoretic security." Designs, Codes and Cryptography 90, no. 3 (January 5, 2022): 593–632. http://dx.doi.org/10.1007/s10623-021-00994-1.
Повний текст джерелаGupta, Manik, Rakesh Kumar, Shashi Shekhar, Bhisham Sharma, Ram Bahadur Patel, Shaily Jain, Imed Ben Dhaou, and Celestine Iwendi. "Game Theory-Based Authentication Framework to Secure Internet of Vehicles with Blockchain." Sensors 22, no. 14 (July 7, 2022): 5119. http://dx.doi.org/10.3390/s22145119.
Повний текст джерелаChien, Hung-Yu, and Nian-Zu Wang. "A Novel MQTT 5.0-Based Over-the-Air Updating Architecture Facilitating Stronger Security." Electronics 11, no. 23 (November 25, 2022): 3899. http://dx.doi.org/10.3390/electronics11233899.
Повний текст джерелаMukherjee, Jaydeep. "Managing Sales Team at Balram Beverages." Vision: The Journal of Business Perspective 21, no. 4 (November 30, 2017): 473–78. http://dx.doi.org/10.1177/0972262917733196.
Повний текст джерелаShliakhtina, E. A., and D. Y. Gamayunov. "GROUP AUTHENTICATION SCHEME BASED ON ZERO-KNOWLEDGE PROOF." Prikladnaya Diskretnaya Matematika, no. 51 (2021): 68–84. http://dx.doi.org/10.17223/20710410/51/3.
Повний текст джерела