Articles with "trusted hardware" as a keyword



Software-Based Remote Network Attestation

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Dependable and Secure Computing"

DOI: 10.1109/tdsc.2021.3077993

Abstract: Internet of Things (IoT) applications build upon resource-constrained, distributed devices that generate data and enable communication. For such applications to be truly trustworthy, it must be ensured that the devices are not compromised by malicious… read more here.

Keywords: software; network; based remote; trusted hardware ... See more keywords

Decaying Photos for Enhanced Privacy: User Perceptions Towards Temporal Redactions and 'Trusted' Platforms

Sign Up to like & get
recommendations!
Published in 2022 at "Proceedings of the ACM on Human-Computer Interaction"

DOI: 10.1145/3555538

Abstract: With the rising popularity of photo sharing in online social media, interpersonal privacy violations, where one person violates the privacy of another, have become an increasing concern. Although applying image obfuscations can be a useful… read more here.

Keywords: decaying photos; temporal redactions; enhanced privacy; privacy ... See more keywords