Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,985,482 papers from all fields of science
Search
Sign In
Create Free Account
Trusted client
Known as:
Trusted-Client
In computing, a trusted client is a device or program controlled by the user of a service, but with restrictions designed to prevent its use in ways…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
14 relations
Blu-ray
Computer hardware
Content Scramble System
DVD region code
Expand
Broader (1)
Computer security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Privacy-Preserving Queries over Secret-Shared Graph-Structured Data
Leyla Roohi
,
Vanessa Teague
IEEE Trustcom/BigDataSE/ICESS
2017
Corpus ID: 6528144
We investigate the use of the SPDZ multiparty computation platform to facilitate secure cloud storage of graphstructured data…
Expand
2017
2017
DDoS attacks prediction in a simulation environment by means of data mining techniques
D. Czyczyn-Egird
,
Rafał Wojszczyk
2017
Corpus ID: 34774987
The notion of Internet attacks has been well-known in the area of computer networks for a long time now. The effects of these…
Expand
2016
2016
Exploratory simulation models for fraudulent detection in Bitcoin system
V. Lee
,
Haozheng Wei
IEEE 11th Conference on Industrial Electronics…
2016
Corpus ID: 18172226
Bitcoin is gaining more popularity because it is designed initially to reduce the transaction cost and improve the online payment…
Expand
2016
2016
Client-Side Secure Deletion on Shared Cloud Storage
Gregor Wegberg
2016
Corpus ID: 63572939
2014
2014
AN APPROACH FOR DESIGN AND IMPLEMENTATION OF SECURE VIDEO STREAMING USING SRTP
P. Iyyanar
2014
Corpus ID: 53415313
Video streaming is one of the most important and growing application in multimedia communication due to reduction of storage and…
Expand
2013
2013
A trust management system for ad-hoc mobile clouds
A. Hammam
,
S. Senbel
International Conference on Communication and…
2013
Corpus ID: 18413819
Most current cloud provisioning involves a data center model, in which clusters of machines are dedicated to running cloud…
Expand
2013
2013
From client-side encryption to secure web applications
Emily Stark
2013
Corpus ID: 61002890
This thesis presents an approach for designing secure web applications that use client-side encryption to keep user data private…
Expand
2010
2010
User Authentication for Online Applications Using a USB-Based Trust Device
Julian Jang
,
Dongxi Liu
,
S. Nepal
,
J. Zic
Security and Privacy in Mobile Information and…
2010
Corpus ID: 2743556
We present a system that enables secure user authentication by leveraging a portable USB-based trusted device. The heart of our…
Expand
2002
2002
Trusted client utilizing security kernel under secure execution mode
바네스브라이언씨.
,
스키미드트로드니더블유.
,
스트론긴지오프레이에스.
,
크리스티데이비드에스.
2002
Corpus ID: 64636346
The system (400A-B) to perform the method and wherein the method is provided. The method includes receiving a request from the…
Expand
1989
1989
Designing a trusted client-server distributed network
Sammy Migues
,
R. Housley
[ Proceedings] Fifth Annual Computer Security…
1989
Corpus ID: 37719177
The client-server distributed network model was analyzed from a security perspective, and an expanded client-server model which…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE