Skip to search formSkip to main contentSkip to account menu

Trusted Computing

Known as: TC, Endorsement key, Treacherous computing 
Trusted Computing (TC) is a technology developed and promoted by the Trusted Computing Group. The term is taken from the field of trusted systems and… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
At Fortanix, we are developing cloud-scale security infrastructure using SGX. For example, our Self-Defending Key Management… 
2014
2014
In this paper we investigate the topic of integrated public-key encryption (PKE) and public-key encryption with keyword search… 
2013
2013
The Internet of Things (IoT) is receiving more and more attention from the research community. The opportunities it creates for… 
2009
2009
Nowadays, trusted platform modules (TPMs) are usually deployed together with desktop PCs and notebooks. However, these platforms… 
2009
2009
A program is a compound of various subroutines playing different roles. In this paper, we study how to attest the execution of… 
Review
2006
Review
2006
Enterprises today face a constant barrage of security threats stemming from worms, viruses, trojans, and other malware. This is… 
2005
2005
This chapter discusses the ubiquitous trusted computing. Trusted platforms can also enable agent technology. Ubiquitous trusted… 
Highly Cited
2004
Highly Cited
2004
The trusted computing group (TCG) specified two protocols that allow a trusted hardware device to remotely convince a… 
2003
2003
One of the biggest issues facing computer technology today is data security. The problem has gotten worse because users are… 
Highly Cited
1993
Highly Cited
1993
In virtually all economic sub-disciplines, practitioners of the dismal science are exceedingly desirous of avoiding normative…