Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 230,068,472 papers from all fields of science
Search
Sign In
Create Free Account
Trusted Computing
Known as:
TC
, Endorsement key
, Treacherous computing
Expand
Trusted Computing (TC) is a technology developed and promoted by the Trusted Computing Group. The term is taken from the field of trusted systems and…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
45 relations
Advanced Access Content System
Analog hole
BIOS
Backup
Expand
Broader (1)
Cryptography
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Challenges For Scaling Applications Across Enclaves
J. Beekman
,
Donald E. Porter
SysTEX@SOSP
2017
Corpus ID: 26925822
At Fortanix, we are developing cloud-scale security infrastructure using SGX. For example, our Self-Defending Key Management…
Expand
2014
2014
Generic constructions of integrated PKE and PEKS
Yu Chen
,
Jiang Zhang
,
D. Lin
,
Zhenfeng Zhang
Designs, Codes and Cryptography
2014
Corpus ID: 15315914
In this paper we investigate the topic of integrated public-key encryption (PKE) and public-key encryption with keyword search…
Expand
2013
2013
Towards secure and context-aware information lookup for the Internet of Things
Michalis Giannikos
,
Korina Kokoli
,
N. Fotiou
,
G. Marias
,
George C. Polyzos
International Conference on Computing, Networking…
2013
Corpus ID: 10124136
The Internet of Things (IoT) is receiving more and more attention from the research community. The opportunities it creates for…
Expand
2009
2009
Implementation Aspects of Mobile and Embedded Trusted Computing
Kurt Dietrich
,
Johannes Winter
Trust and Trustworthy Computing
2009
Corpus ID: 37581974
Nowadays, trusted platform modules (TPMs) are usually deployed together with desktop PCs and notebooks. However, these platforms…
Expand
2009
2009
Remote Attestation on Function Execution (Work-in-Progress)
Liang Gu
,
Yueqiang Cheng
,
Xuhua Ding
,
R. Deng
,
Yao Guo
,
Weizhong Shao
International Conference on Trusted Systems
2009
Corpus ID: 13536948
A program is a compound of various subroutines playing different roles. In this paper, we study how to attest the execution of…
Expand
Review
2006
Review
2006
Towards Autonomic Enterprise Security: Self-Defending Platforms, Distributed Detection, and Adaptive Feedback
John Mark Agosta
2006
Corpus ID: 17487813
Enterprises today face a constant barrage of security threats stemming from worms, viruses, trojans, and other malware. This is…
Expand
2005
2005
Concepts of trusted computing
G. Proudler
2005
Corpus ID: 61422280
This chapter discusses the ubiquitous trusted computing. Trusted platforms can also enable agent technology. Ubiquitous trusted…
Expand
Highly Cited
2004
Highly Cited
2004
Better Privacy for Trusted Computing Platforms: (Extended Abstract)
J. Camenisch
European Symposium on Research in Computer…
2004
Corpus ID: 15701256
The trusted computing group (TCG) specified two protocols that allow a trusted hardware device to remotely convince a…
Expand
2003
2003
How trustworthy is trusted computing?
S. J. Vaughan-Nichols
Computer
2003
Corpus ID: 18159829
One of the biggest issues facing computer technology today is data security. The problem has gotten worse because users are…
Expand
Highly Cited
1993
Highly Cited
1993
Public Finance Texts Cannot Justify Government Taxation: A Critique
W. Block
1993
Corpus ID: 18303073
In virtually all economic sub-disciplines, practitioners of the dismal science are exceedingly desirous of avoiding normative…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE