„Trusted Hardware“
Suchergebnisse
1.000+ Treffer
-
On (not) Trusting Trusted Hardware
-
Managing obsolescence of embedded hardware and software in secure and trusted systems
-
A Vulnerability Management Solution for constrained IoT devices with a Trusted Execution Environment using a Hardware Root of Trust
-
Cryptographic Protocols from Physical Assumptions
-
Towards trustworthy neuromorphic computing: an analysis of hardware security and reliability risks
-
Trusted Computing für adaptive Automobilsteuergeräte im Umfeld der Inter-Fahrzeug-Kommunikation
-
Trustworthy Computing and Services – International Conference, ISCTCS 2013, Beijing, China, November 2013, Revised Selected Papers
-
Trustworthy Global Computing – 8th International Symposium, TGC 2013, Buenos Aires, Argentina, August 30-31, 2013, Revised Selected Papers
-
Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication – 5th IFIP WG 11.2 International Workshop, WISTP 2011, Heraklion, Crete, Greece, June 1-3, 2011. Proceedings
-
Disarmament hacking 2.0: toward a trusted, open-hardware computing platform for nuclear warhead verification
-
Trustworthy Reconfigurable Systems – Enhancing the Security Capabilities of Reconfigurable Hardware Architectures
-
Communication-Efficient BFT Using Small Trusted Hardware to Tolerate Minority Corruption
-
Brief Announcement: Communication-Efficient BFT Using Small Trusted Hardware to Tolerate Minority Corruption
-
Trusted Computing and Information Security – 11th Chinese Conference, CTCIS 2017, Changsha, China, September 14-17, 2017, Proceedings
-
Multi-index federated aggregation algorithm based on trusted verification
-
Trusted Digital Circuits – Hardware Trojan Vulnerabilities, Prevention and Detection
-
Secure System Design and Trustable Computing
-
Trust and Trustworthy Computing – 8th International Conference, TRUST 2015, Heraklion, Greece, August 24-26, 2015, Proceedings
-
Trusted Computing for Embedded Systems
-
Coronal Magnetometry