Trusted Platform Module

Known as: Fritz chip, TPM, TPM Chip 
Trusted Platform Module (TPM) is an international standard for a secure cryptoprocessor, which is a dedicated microcontroller designed to secure… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
536 or more than a decade, commercial PC platforms have been shipping with a standards-based embedded security subsystem on the… (More)
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
2014
2014
Near Field Communication (NFC)-based mobile phone services offer a lifeline to the under-appreciated multiapplication smart card… (More)
  • figure 1
  • figure 2
Is this relevant?
Review
2014
Review
2014
Recently, computer security has been trending toward hardware security, notably Trusted Platform Module (TPM). This paper… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2011
2011
The Trusted Platform Module (TPM) is commonly thought of as hardware that can increase platform security. However, it can also be… (More)
  • table 1
  • figure 1
  • figure 3
  • table 2
  • table 4
Is this relevant?
2010
2010
A Trusted Platform Module (TPM) authenticates general purpose computing platforms. This is done by taking platform integrity… (More)
  • figure 1
  • figure 2
  • table I
  • figure 3
  • figure 4
Is this relevant?
2008
2008
Data protection has become a major requirement for computer systems which process sensitive information especially in daily… (More)
  • figure 2
  • figure 3
Is this relevant?
2008
2008
When developing and researching new trusted computing technologies, appropriate tools to investigate their behavior and to… (More)
Is this relevant?
Highly Cited
2008
Highly Cited
2008
A lot of progress has been made to secure network communication, e.g., through the use of cryptographic algorithms. However, this… (More)
  • figure 1
  • figure 2
Is this relevant?
Highly Cited
2006
Highly Cited
2006
We present the design and implementation of a system that enables trusted computing for an unlimited number of virtual machines… (More)
  • figure 2
  • figure 1
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2005
2005
In recent years, the necessity, functionality and new possibilities of trusted computing, especially the new standard from the… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?