Trusted Execution Technology

Known as: Intel LaGrande, Tboot, Trusted execution 
Intel Trusted Execution Technology (Intel TXT, formerly known as LaGrande Technology) is a computer hardware technology whose primary goals are… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

2003-2017
05101520032017

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
The emergence of powerful, sensor-rich devices has led to the development of <i>continuous authentication</i> (CA) schemes using… (More)
  • figure 1
  • table 1
  • figure 2
  • table 2
  • figure 3
Is this relevant?
2017
2017
Trusted execution environments (TEEs) allow asserting the integrity of previously untrusted third parties using novel hardware… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 6
Is this relevant?
2017
2017
Trusted execution support in modern CPUs, as offered by Intel SGX enclaves, can protect applications in untrusted environments… (More)
  • figure 1
  • figure 2
  • table 1
  • figure 3
  • figure 4
Is this relevant?
2016
2016
We present a new approach to authentication using Trusted Execution Environments (TEEs), by changing the location of… (More)
  • table 1
  • figure 1
  • figure 2
Is this relevant?
Review
2016
Review
2016
Today, isolated trusted computation and code execution is of paramount importance to protect sensitive information and workfl ows… (More)
  • figure 2
Is this relevant?
2013
2013
architecture called Intel® Trusted Execution Technology (Intel® TXT) that provides hardware-based security technologies to help… (More)
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
Review
2013
Review
2013
A trusted execution environment (TEE) is a secure processing environment that is isolated from the normal processing environment… (More)
Is this relevant?
Review
2010
Review
2010
Various security mechanisms are available to validate, authenticate and permit codes, data and scripts for executing in a… (More)
  • figure 1
  • table 1
  • figure 3
  • figure 2
  • figure 5
Is this relevant?
2007
2007
Many security protocols refer to a trusted third party (TTP) as an ideal way of handling computation and data with conflicting… (More)
  • figure 1
  • figure 3
  • figure 2
  • table 1
  • table 2
Is this relevant?