Essays about: "Trusted Platform Module"

Showing result 1 - 5 of 7 essays containing the words Trusted Platform Module.

  1. 1. User access control platform based on simple IoT household devices

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Ruijie Xiao; [2021]
    Keywords : IoT; Smart Home; Multiuser; Multi-device; Access Control; IoT; Smart hem; Fleranvändare; Multi-enhet; Åtkomstkontroll;

    Abstract : The Internet of Things (IoT) industry has been thriving for the past few years, especially in the household field. The proposal of smart homes has enabled a increasing number of IoT products to enter people’s daily lives. However, the access control in smart homes has gradually grown up to be a prominent problem. READ MORE

  2. 2. Hardware Root of Trust for Linux Based Edge Gateway

    University essay from Högskolan Kristianstad/Fakulteten för naturvetenskap

    Author : Mohamed Al-Galby; Madani Arezou; [2018]
    Keywords : HRoT; TPM 2.0; Zynq; TSS; RSA; Secure Boot; TPM Simulator;

    Abstract : Linux-based Edge Gateways that connects hundreds or maybe thousands of IoT devices, are exposed to various threats and cyber-attacks from the internet. These attacks form a considerable risk targeting the privacy and confidentiality of IoT devices throughout their gateways. READ MORE

  3. 3. Improving smartphone security with remote attestation

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Jesper Persson; [2017]
    Keywords : Remote attestation; mobile security;

    Abstract : Smartphones are becoming increasingly powerful and useful in a work environment. This has led to their adoption at the workplace. Many companies hand out smartphones to their employees and allow employees to bring their own devices to work. There are multiple potential vulnerabilities with such a situation. READ MORE

  4. 4. Emulation of TPM on Raspberry Pi

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Erik Nilsson; Marcus Sundberg; [2015]
    Keywords : TPM; Trusted Computing; Raspberry Pi; Technology and Engineering;

    Abstract : The Trusted Platform Module (TPM) is a dedicated microprocessor designed to secure hardware by integrating cryptographic keys into the non-volatile memory of the module. TPM is specified by the Trusted Computing Group (TCG). TCG is an initiative started in 2003 by several multinational semiconductor and IT-companies. READ MORE

  5. 5. Trusted Computing and Secure Virtualization in Cloud Computing

    University essay from RISE./Security Lab

    Author : Nicolae Paladi; [2012]
    Keywords : cloud computing; trusted computing; tpm; virtualization; security;

    Abstract : Large-scale deployment and use of cloud computing in industry is accompanied and in the same time hampered by concerns regarding protection of data handled by cloud computing providers. One of the consequences of moving data processing and storage off company premises is that organizations have less control over their infrastructure. READ MORE