Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 233,435,454 papers from all fields of science
Search
Sign In
Create Free Account
Trusted Computing
Known as:
TC
, Endorsement key
, Treacherous computing
Expand
Trusted Computing (TC) is a technology developed and promoted by the Trusted Computing Group. The term is taken from the field of trusted systems and…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
45 relations
Advanced Access Content System
Analog hole
BIOS
Backup
Expand
Broader (1)
Cryptography
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Relating Interactive System Design and Information Theory from Information Leakage Perspective
Kushal Anjaria
,
Arun Mishra
2017
Corpus ID: 54623424
In contemporary interactive software system design, to maintain equilibrium between usability and security is a challenging task…
Expand
2014
2014
Increasing the Resilience and Trustworthiness of OpenID Identity Providers for Future Networks and Services
D. Kreutz
,
Eduardo Luzeiro Feitosa
,
Hugo Cunha
,
H. Niedermayer
,
Holger Kinkelin
Ninth International Conference on Availability…
2014
Corpus ID: 15376999
We introduce a set of tools and techniques for increasing the resilience and trustworthiness of identity providers (IdPs) based…
Expand
2013
2013
Towards secure and context-aware information lookup for the Internet of Things
Michalis Giannikos
,
Korina Kokoli
,
N. Fotiou
,
G. Marias
,
George C. Polyzos
International Conference on Computing, Networking…
2013
Corpus ID: 10124136
The Internet of Things (IoT) is receiving more and more attention from the research community. The opportunities it creates for…
Expand
2010
2010
Research on Trust Model Based on Behavior and Trusted Computing
Yue Gu
,
Jun Chen
,
Yan Wang
2010
Corpus ID: 62748867
Trusted computing technology is a basic and entirely solution for security problems of computer. In order to solve the security…
Expand
2007
2007
Protecting mobile agents' data using trusted computing technology
Xian
,
Hequn
,
Feng
,
Deng-guo
2007
Corpus ID: 11435977
Even with attractive computational advantages, mobile agent technology has not developed its full potential due to various…
Expand
Review
2006
Review
2006
Towards Autonomic Enterprise Security: Self-Defending Platforms, Distributed Detection, and Adaptive Feedback
John Mark Agosta
2006
Corpus ID: 17487813
Enterprises today face a constant barrage of security threats stemming from worms, viruses, trojans, and other malware. This is…
Expand
2006
2006
Trusted Computing for Disk Drives and Other Peripherals
R. Thibadeau
IEEE Security and Privacy
2006
Corpus ID: 8777534
Disk drives and other intelligent peripherals are critical to security, privacy, and trust in the computing infrastructure. This…
Expand
2005
2005
Concepts of trusted computing
G. Proudler
2005
Corpus ID: 61422280
This chapter discusses the ubiquitous trusted computing. Trusted platforms can also enable agent technology. Ubiquitous trusted…
Expand
2004
2004
Research and Development of Trusted Computing
Zhou Ming
2004
Corpus ID: 63444649
Trustworthiness is key concern that has been addressed only after a technology is developed and deployed.This paper analyzes the…
Expand
2003
2003
How trustworthy is trusted computing?
S. Vaughan-Nichols
Computer
2003
Corpus ID: 18159829
One of the biggest issues facing computer technology today is data security. The problem has gotten worse because users are…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE