Trusted execution environment

Known as: AMD PSP 
The Trusted Execution Environment (TEE) is a secure area of the main processor of a smart phone (or any connected device including tablets, set-top… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

2007-2017
010203020072017

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
With the advent of the Internet of Things (IoT), security has emerged as a major design goal for smart connected devices. This… (More)
  • figure 1
  • figure 2
Is this relevant?
2016
2016
We present a new approach to authentication using Trusted Execution Environments (TEEs), by changing the location of… (More)
  • table 1
  • figure 1
  • figure 2
Is this relevant?
2016
2016
Mobile systems have become widely adopted by users to perform sensitive operations ranging from on-line payments for personal use… (More)
  • figure 1
  • table 1
Is this relevant?
2015
2015
ARM TrustZone, which provides a Trusted Execution Environment (TEE), normally plays a role in keeping security-sensitive… (More)
  • table I
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2015
2015
Hardware-based Trusted Execution Environments (TEEs) are widely deployed in mobile devices. Yet their use has been limited… (More)
  • figure 1
  • figure 2
  • figure 3
  • table II
  • table V
Is this relevant?
2015
2015
New types of Trusted Execution Environment (TEE) architectures like TrustLite and Intel Software Guard Extensions (SGX) are… (More)
  • figure 1
  • figure 2
  • table 1
Is this relevant?
Review
2014
Review
2014
Smartphones are now handling personal and extremely important data and applications. This increases mobile environment threats… (More)
  • figure 1
  • figure 3
  • figure 4
  • figure 2
  • figure 5
Is this relevant?
Review
2013
Review
2013
A trusted execution environment (TEE) is a secure processing environment that is isolated from the normal processing environment… (More)
Is this relevant?
2013
2013
Sensor data is a core component of big data. The abundance of sensor data combined with advances in data integration and data… (More)
  • figure 1
Is this relevant?
2012
2012
Trusted Execution Environments are quickly becoming a preferred method for providing isolation between secure and non-secure… (More)
  • figure 1
  • figure 2
  • figure 3
Is this relevant?