Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 226,117,935 papers from all fields of science
Search
Sign In
Create Free Account
Trusted Platform Module
Known as:
Fritz chip
, TPM
, TPM Chip
Expand
Trusted Platform Module (TPM) is an international standard for a secure cryptoprocessor, which is a dedicated microcontroller designed to secure…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
49 relations
AMD OverDrive
Authentication
BIOS
BitLocker
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2012
Review
2012
Draining development? Controlling flows of illicit funds from developing countries
P. Reuter
2012
Corpus ID: 154161425
The book provides the first collection of analytic contributions, as opposed to advocacy essays and black box estimates, on…
Expand
2012
2012
Development of world class manufacturing framework by using six-sigma, total productive maintenance and lean
Mohammad amin Okhowat
,
Khairul Arifin
,
Taravatsadat Nehzati
,
Seyed Ali Hosseini
2012
Corpus ID: 55034220
This is an open access article licensed under the Creative Commons Attribution 4.0 International License.
2012
2012
TPM - Trusted Platform Module
Filip Eichenmann
2012
Corpus ID: 114871021
Prace zacina popisem architektury cipu TPM a vysvětlenim souvisejicich pojmů. Dale jsou uvedeny zakladni funkce, ktere cip nabizi…
Expand
2010
2010
Utilizing trusted platform module to mitigate botnet attacks
Muththolib Sidheeq
,
A. Dehghantanha
,
Geetha Kananparan
International Conference on Computer Applications…
2010
Corpus ID: 16295577
Ever since, internet banking came into existence it has been a bull's eye for the hackers. Up to date, several cases have been…
Expand
2010
2010
A Cloud Architecture of Virtual Trusted Platform Modules
Dongxi Liu
,
Jack Lee
,
Julian Jang
,
S. Nepal
,
J. Zic
IEEE/IFIP International Conference on Embedded…
2010
Corpus ID: 6805245
We propose and implement a cloud architecture of virtual TPMs. In this architecture, TPM instances can be obtained from the TPM…
Expand
Highly Cited
2007
Highly Cited
2007
Compartmented Security for Browsers - Or How to Thwart a Phisher with Trusted Computing
Sebastian Gajek
,
A. Sadeghi
,
Christian Stüble
,
M. Winandy
ARES
2007
Corpus ID: 14822245
Identity theft through phishing attacks has become a major concern for Internet users. Typically, phishing attacks aim at luring…
Expand
2006
2006
Research on Trusted Platform Module
Han Wen-bao
2006
Corpus ID: 64292496
With the development of information technology,the advantage of trusted computer in security is much accounted of The Trusted…
Expand
Highly Cited
2004
Highly Cited
2004
Better Privacy for Trusted Computing Platforms: (Extended Abstract)
J. Camenisch
European Symposium on Research in Computer…
2004
Corpus ID: 15701256
The trusted computing group (TCG) specified two protocols that allow a trusted hardware device to remotely convince a…
Expand
Highly Cited
2004
Highly Cited
2004
An electrochemical study for corrosion inhibition of iron by some organic phosphonium chloride derivatives in acid media
K.F Khaled
2004
Corpus ID: 56361516
Highly Cited
1988
Highly Cited
1988
Reduction in codimension of mixed foliate CR-submanifolds of a Kaehler manifold
Sharief Deshmukh
1988
Corpus ID: 40844051
Starting with a proper mixed foliate Ci?-submanifold M of dimension 2p-\-q in a hyperbolic complex space form M(—4) of dimension…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required