Trusted electronic systems with untrusted cots

被引:0
|
作者
Yang, Shuo [1 ]
Chakraborty, Prabuddha [1 ]
Slpsk, Patanjali [1 ]
Bhunia, Swarup [1 ]
机构
[1] University of Florida Gainesville), Florida,32611, United States
关键词
D O I
9424257
中图分类号
学科分类号
摘要
Field programmable gate arrays (FPGA)
引用
收藏
页码:198 / 203
相关论文
共 50 条
  • [1] Trusted Electronic Systems with Untrusted COTS
    Yang, Shuo
    Chakraborty, Prabuddha
    Slpsk, Patanjali
    Bhunia, Swarup
    PROCEEDINGS OF THE 2021 TWENTY SECOND INTERNATIONAL SYMPOSIUM ON QUALITY ELECTRONIC DESIGN (ISQED 2021), 2021, : 198 - 203
  • [2] Trusted and untrusted
    Halvorsen, Tori Flaatten
    TIDSSKRIFT FOR DEN NORSKE LAEGEFORENING, 2021, 141 (16) : 1548 - 1551
  • [3] Triad: Trusted Timestamps in Untrusted Environments
    Fernandez, Gabriel
    Brito, Andrey
    Fetzer, Christof
    2023 IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE, CLOUDCOM 2023, 2023, : 169 - 176
  • [4] Trusted Display on Untrusted Commodity Platforms
    Yu, Miao
    Gligor, Virgil D.
    Zhou, Zongwei
    CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, : 989 - 1003
  • [5] Coding for Trusted Storage in Untrusted Networks
    Oliveira, Paulo F.
    Lima, Luisa
    Vinhoza, Tiago T. V.
    Barros, Joao
    Medard, Muriel
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (06) : 1890 - 1899
  • [6] Trusted Storage over Untrusted Networks
    Oliveira, Paulo F.
    Lima, Luisa
    Vinhoza, Tiago T. V.
    Barros, Joao
    Medard, Muriel
    2010 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE GLOBECOM 2010, 2010,
  • [7] A Look at Trusted SoC with Untrusted Components
    Ivanov, Andre
    IEEE DESIGN & TEST, 2013, 30 (02) : 4 - 4
  • [8] Behind Enemy Lines: Exploring Trusted Data Stream Processing on Untrusted Systems
    Thoma, Cory
    Lee, Adam J.
    Labrinidis, Alexandros
    PROCEEDINGS OF THE NINTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY '19), 2019, : 243 - 254
  • [9] A Trusted Virtual Machine in an Untrusted Management Environment
    Li, Chunxiao
    Raghunathan, Anand
    Jha, Niraj K.
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2012, 5 (04) : 472 - 483
  • [10] MIH and CRRM Handover in Trusted or Untrusted Environments
    Wu, Mei-Yu
    Leu, Fang-Yie
    INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING, IMIS-2019, 2020, 994 : 525 - 536