Learn More
We investigate a technique for image restoration using nonlinear networks based on radial basis functions. The technique is also based on the concept of training or learning by examples. When trained properly, these networks are used as spatially invariant feedforward nonlinear filters that can perform restoration of images degraded by nonlinear degradation(More)
Trusted Computing, used as a security technology, can establish trust between multiple parties. One implementation of Trusted Computing Technology standardized by the Trusted Computing Group is the Trusted Platform Module (TPM). We build on the security provided by the TPM to create a trusted variant of Identity Management Systems based on the popular(More)
The Third Generation Partnership Project (3GPP) standardisation group currently discusses advanced applications of mobile networks such as Machine-to-Machine (M2M) communication. Several security issues arise in these contexts which warrant a fresh look at mobile networks' security foundations, resting on smart cards. This paper contributes a(More)
—The establishment of trust relationships to a trusted platform relies on the process of validation. Validation allows an external entity to build trust in the expected behaviour of the platform based on provided evidence of the platform's configuration. In a validation mechanism such as remote attestation, the trusted platform exhibits verification data(More)
—We define secure operations with tree-formed, protected verification data registers. Functionality is conceptually added to Trusted Platform Modules (TPMs) to handle Platform Configuration Registers (PCRs) which represent roots of hash trees protecting the integrity of tree-formed Stored Measurement Logs (SMLs). This enables verification and update of an(More)