„Trusted Computing“
Suchergebnisse
559 Treffer
-
Trust towards Virtual Humans in Immersive Virtual Reality and Influencing Factors
-
Trustworthy data provisioning in blockchain-based decentralized applications
-
Remote Security Threats and Protection of Modern FPGA-SoC Architectures
-
Phishing prevention: a multi-layered approach
-
Usable privacy and security in smart homes
-
A hybrid flow-based intrusion detection system incorporating uncertainty
-
Secure and User-Friendly Setup and Maintenance of Wirelessly Interconnected Embedded Systems
-
Improving functionality, efficiency, and trustworthiness of secure communication on an internet diversified by mobile devices and the internet of things
-
Investigations into social engineering evidence for security research
-
A Vulnerability Management Solution for constrained IoT devices with a Trusted Execution Environment using a Hardware Root of Trust
-
A Secured Architecture for Mitigating Distributed Denial of Service Attack Integrating Internet of Things and Cloud Computing
-
Eternal Systems – First InternationalWorkshop, EternalS 2011, Budapest, Hungary, May 3, 2011, Revised Selected Papers
-
Privacy-preserving protocols and applications for trusted platforms
-
Beyond Assumptions: The Value of Provable Security in Cryptographic Design
-
Intelligent Gamified Crowdsourcing for Audio Processing
-
Reconciling Forensics with Security: From Securing ARM TrustZone Firmware to Transparent Digital Forensic Investigations
-
Object Trust – From Trustworthy Hosts to Trustworthy Data
-
(Un)Trustworthy data in adversarial machine learning
-
Towards trustworthy neuromorphic computing: an analysis of hardware security and reliability risks
-
Toward the Adoption of Artificial Intelligence: Exploring the Critical Role of Trust