Skip to search formSkip to main contentSkip to account menu

Trusted Computing

Known as: TC, Endorsement key, Treacherous computing 
Trusted Computing (TC) is a technology developed and promoted by the Trusted Computing Group. The term is taken from the field of trusted systems and… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
In contemporary interactive software system design, to maintain equilibrium between usability and security is a challenging task… 
2014
2014
We introduce a set of tools and techniques for increasing the resilience and trustworthiness of identity providers (IdPs) based… 
2013
2013
The Internet of Things (IoT) is receiving more and more attention from the research community. The opportunities it creates for… 
2010
2010
Trusted computing technology is a basic and entirely solution for security problems of computer. In order to solve the security… 
2007
2007
Even with attractive computational advantages, mobile agent technology has not developed its full potential due to various… 
Review
2006
Review
2006
Enterprises today face a constant barrage of security threats stemming from worms, viruses, trojans, and other malware. This is… 
2006
2006
Disk drives and other intelligent peripherals are critical to security, privacy, and trust in the computing infrastructure. This… 
2005
2005
This chapter discusses the ubiquitous trusted computing. Trusted platforms can also enable agent technology. Ubiquitous trusted… 
2004
2004
Trustworthiness is key concern that has been addressed only after a technology is developed and deployed.This paper analyzes the… 
2003
2003
One of the biggest issues facing computer technology today is data security. The problem has gotten worse because users are…