Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,190,748 papers from all fields of science
Search
Sign In
Create Free Account
Trusted path
Known as:
Trusted channel
Trusted path or trusted channel — is a mechanism that provides confidence that the user is communicating with what the user intended to communicate…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
16 relations
Certification path validation algorithm
Common Criteria
Computer file
Digital signature
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
e-SAFE: Secure, Efficient and Forensics-Enabled Access to Implantable Medical Devices
Haotian Chi
,
Longfei Wu
,
Xiaojiang Du
,
Qiang Zeng
,
P. Ratazzi
IEEE Conference on Communications and Network…
2018
Corpus ID: 4718992
To facilitate monitoring and management, modern Implantable Medical Devices (IMDs) are often equipped with wireless capabilities…
Expand
2016
2016
A tiny hypervisor-based trusted geolocation framework with minimized TPM operations
Sungjin Park
,
J. Won
,
Jaewoo Yoon
,
K. Kim
,
Taisook Han
Journal of Systems and Software
2016
Corpus ID: 4368580
2016
2016
Fuzzy-based trusted routing to mitigate packet dropping attack between data aggregation points in smart grid communication network
P. Ganeshkumar
,
Durgadevi Velusamy
,
Anand Paul
,
Ku-Jin Kim
Computing
2016
Corpus ID: 24125233
Providing adequate security measure during data transmission is one of the essential requirements of smart grid communication…
Expand
2015
2015
TGVisor: A Tiny Hypervisor-Based Trusted Geolocation Framework for Mobile Cloud Clients
Sungjin Park
,
Jaewoo Yoon
,
Cheoloh Kang
,
K. Kim
,
Taisook Han
IEEE International Conference on Mobile Cloud…
2015
Corpus ID: 4353733
In cloud computing, geographic location of data is one of major security concerns of cloud users. To resolve this problem, most…
Expand
2011
2011
Touch'n Trust: An NFC-Enabled Trusted Platform Module
M. Hutter
,
Ronald Tögl
2011
Corpus ID: 56375989
Instant and ubiquitous access to devices such as public terminals raises several security concerns in terms of confidentiality…
Expand
2007
2007
SecureCore software architecture trusted path application (TPA) requirements
P. Clark
,
C. Irvine
,
T. Levin
,
Thuy D. Nguyen
,
Timothy M. Vidas
2007
Corpus ID: 57222646
Abstract : A mobile computing device has more inherent risk than desktops or most other stationary computing devices. Such mobile…
Expand
2005
2005
Implementation of electronic signatures: a discussion on regulatory issues
R. Gururajan
2005
Corpus ID: 30802058
To address and facilitate the growth of activities in the area of e- and m-commerce, United Nations produced a document called…
Expand
2004
2004
A Trusted Path Design and Implementation for Security Enhanced Linux
Allan Hilchie
2004
Corpus ID: 60066562
Abstract : The threat posed by malicious software and networked adversaries to computers has resulted in the development of…
Expand
2000
2000
Secure compartmented data access over an untrusted network using a COTS-based architecture
P. Clark
,
M. Meissner
,
K. Vance
Asia-Pacific Computer Systems Architecture…
2000
Corpus ID: 9165402
We present an approach to secure compartmented data access over an untrusted network using a secure network computing…
Expand
1988
1988
The trusted path between SMITE and the user
S. Wiseman
,
P. Terry
,
Andrew Wood
,
C. Harrold
Proceedings. IEEE Symposium on Security and…
1988
Corpus ID: 41142961
If signaling channels can only be driven by a trusted path, they cannot be exploited by trojan horses in untrusted software. To…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE