2010
DOI: 10.1109/tce.2010.5439136
|View full text |Cite
|
Sign up to set email alerts
|

Design and implementation of mobile trusted module for trusted mobile computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2012
2012
2018
2018

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 27 publications
(8 citation statements)
references
References 1 publication
0
8
0
Order By: Relevance
“…In browser attack, adversary steals data by sabotaging the signature and encryption during the transformation of SOAP (Simple Object Authentication Protocol) messages in between the web browser and web server, causing the browser to consider the adversary as a authorized user and process all requests, communicating with web server [16]. The counter measure to this attack is to enable WS-Security to web browsers.…”
Section: H Man-in-the-middle (Mitm) Attackmentioning
confidence: 99%
See 2 more Smart Citations
“…In browser attack, adversary steals data by sabotaging the signature and encryption during the transformation of SOAP (Simple Object Authentication Protocol) messages in between the web browser and web server, causing the browser to consider the adversary as a authorized user and process all requests, communicating with web server [16]. The counter measure to this attack is to enable WS-Security to web browsers.…”
Section: H Man-in-the-middle (Mitm) Attackmentioning
confidence: 99%
“…It has some constraints such as circuit area, available power. Therefore, a MTM needs the spatially-optimized architecture and design method [16]. MTM is mainly applied to authentication terminals from telecommunication channel to accomplished security functions such as, hash functions, signature schemes, and asymmetric encryption.…”
Section: Mobile Trusted Module(mtm)mentioning
confidence: 99%
See 1 more Smart Citation
“…The Trusted Platform Module (TPM) is a hardware based module that provides secure storage and secure attestation in addition to cryptographic hashes and signatures [7]. TPM can provide load-time integrity for the hypervisor, but the challenge is to provide run-time integrity.…”
Section: A Hypervisor Control Flow Integritymentioning
confidence: 99%
“…IoT advancements are necessary piece of the shrewd learning condition, for example, keen classrooms. Savvy classroom is an idea which coordinates a few data and correspondence innovations to empower synergistic learning so as to enhance the general learning and showing forms [3]. Diverse innovations can be utilized for conveying a shrewd classroom, for example, NFC, brilliant cell phones, interactive media gadgets and so forth.…”
Section: Introductionmentioning
confidence: 99%