Chain of trust

Known as: Trust chain 
In computer security, a chain of trust is established by validating each component of hardware and software from the bottom up. It is intended to… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

2000-2018
051020002018

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2011
2011
As wireless sensor network (WSN) becomes more popular in environmental, business and military applications, security issues… (More)
  • figure 2
  • figure 1
  • figure 4
  • figure 5
  • figure 6
Is this relevant?
2011
2011
Today's VANET applications are vastly focused towards fulfilling users' requirements on road and making their journey safe and… (More)
  • figure 2
  • figure 1
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2010
2010
Trusted computing has become a new trend in the area of international information security, and the products of trusted computing… (More)
  • figure 1
  • figure 3
  • figure 5
  • figure 6
  • figure 7
Is this relevant?
2010
2010
Advances and significant national infrastructure investment into clinical information systems are spurring a demand for secondary… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2009
2009
The World Wide Web has transformed into an environment where users both produce and consume information. In order to judge the… (More)
  • figure 1
  • figure 2
Is this relevant?
2007
2007
Trusted Computing (TC) is an emerging technology towards building trustworthy computing platforms. The TrustedComputing Group… (More)
  • figure 1
  • table 1
Is this relevant?
2007
2007
Facing ubiquitous threats like computer viruses, trojans and theft of intellectual property, Trusted computing (TC) is an… (More)
  • figure 1
Is this relevant?
2007
2007
Product authentication is needed to detect counterfeit products and to prevent them from entering the distribution channels of… (More)
  • figure 1
  • figure 2
  • figure 3
  • table I
  • table II
Is this relevant?
2005
2005
Mobile agents are mobile programs capable of maintaining their execution state as they migrate across different execution… (More)
Is this relevant?
2005
2005
In this paper we discuss the analysis of trusted platform communication. While the trusted platform module itself is considered… (More)
  • figure 1
  • table 1
  • figure 2
  • table 2
Is this relevant?