2014
DOI: 10.3844/jcssp.2014.2299.2314
|View full text |Cite
|
Sign up to set email alerts
|

Design and Implementation of the TPM User Authentication Model

Abstract: The Trusted Computing Group (TCG) has introduced the Trusted Platform Module (TPM) as a solution to assure end users of their privacy and confidentiality. Although the TPM is designed to prevent software attacks, the TPM itself is vulnerable to physical attacks that could enable intruders to gain access to confidential data. In general, the TPM provides an ID and implements a password identification technique to prevent unauthorized users from gaining access to the TPM. The TPM user authentication is carried o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
5
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(5 citation statements)
references
References 11 publications
(14 reference statements)
0
5
0
Order By: Relevance
“…e heuristic evaluation method, conducted by experts, is one of the preferred methods for assessing the usability of games. Most of the modular heuristic evaluations are conducted using Neilson's proposals that focus on software [6,7]. Recent research by [8], in which a systematic review on heuristics was conducted, have reported that the heuristics and usability of educational games still offer potential for exploration in specific evaluation and validation of the process.…”
Section: Introductionmentioning
confidence: 99%
“…e heuristic evaluation method, conducted by experts, is one of the preferred methods for assessing the usability of games. Most of the modular heuristic evaluations are conducted using Neilson's proposals that focus on software [6,7]. Recent research by [8], in which a systematic review on heuristics was conducted, have reported that the heuristics and usability of educational games still offer potential for exploration in specific evaluation and validation of the process.…”
Section: Introductionmentioning
confidence: 99%
“…Universities are unwilling to invest in technology without such assessments. As a result, there are no objective definitions of success in the development process, which stymies growth [9][10][11][12][13][14][15]. As a result, the current research will look at the applicability of DeLone and Mclean's concept to different cultures, particularly Jordan's.…”
Section: Introductionmentioning
confidence: 99%
“…As a result, the findings of this study, which aims to broaden comparative assessments of using Dealone and Mclean's model in developing nations, will assist other research studies exploring cross-cultural aspects and those in the meta-assessment field. This study also aims to determine the significance of technological attitudes and their relationships with VR-learning intent, usage, user satisfaction, and net benefits [10][11][12][13][14][15][16][17][18].…”
Section: Introductionmentioning
confidence: 99%
“…Universities are unwilling to invest in technology without such assessments. As a result, there are no objective definitions of success in the development process, which stymies growth [9][10][11][12][13][14][15]. As a result, the current research will look at the applicability of DeLone and Mclean's concept to different cultures, particularly Jordan's.…”
Section: Introductionmentioning
confidence: 99%
“…As a result, the findings of this study, which aims to broaden comparative assessments of using Dealone and Mclean's model in developing nations, will assist other research studies exploring cross-cultural aspects and those in the meta-assessment field. This study also aims to determine the significance of technological attitudes and their relationships with VR-learning intent, usage, user satisfaction, and net benefits [10][11][12][13][14][15][16][17][18].…”
Section: Introductionmentioning
confidence: 99%