Security and privacy in device-to-device (D2D) communication: A review
Device-to-device (D2D) communication presents a new paradigm in mobile networking to
facilitate data exchange between physically proximate devices. The development of D2D is …
facilitate data exchange between physically proximate devices. The development of D2D is …
Trusted execution environment: What it is, and what it is not
M Sabt, M Achemlal… - 2015 IEEE Trustcom …, 2015 - ieeexplore.ieee.org
Nowadays, there is a trend to design complex, yet secure systems. In this context, the
Trusted Execution Environment (TEE) was designed to enrich the previously defined trusted …
Trusted Execution Environment (TEE) was designed to enrich the previously defined trusted …
[HTML][HTML] A survey on the (in) security of trusted execution environments
As the number of security and privacy attacks continue to grow around the world, there is an
ever increasing need to protect our personal devices. As a matter of fact, more and more …
ever increasing need to protect our personal devices. As a matter of fact, more and more …
{fTPM}: A {Software-Only} Implementation of a {TPM} Chip
Commodity CPU architectures, such as ARM and Intel CPUs, have started to offer trusted
computing features in their CPUs aimed at displacing dedicated trusted hardware …
computing features in their CPUs aimed at displacing dedicated trusted hardware …
Trusted mobile computing: An overview of existing solutions
Nowadays, smartphones are able to process large amounts of data enabling the use of
applications for personal or professional use. In these contexts, the smartphone needs to …
applications for personal or professional use. In these contexts, the smartphone needs to …
Building trust for smart connected devices: The challenges and pitfalls of TrustZone
TrustZone-based Trusted Execution Environments (TEEs) have been utilized extensively for
the implementation of security-oriented solutions for several smart intra and inter-connected …
the implementation of security-oriented solutions for several smart intra and inter-connected …
Regulating arm trustzone devices in restricted spaces
Smart personal devices equipped with a wide range of sensors and peripherals can
potentially be misused in various environments. They can be used to exfiltrate sensitive …
potentially be misused in various environments. They can be used to exfiltrate sensitive …
Security and privacy attacks during data communication in software defined mobile clouds
There has been an enormous growth in networking and data communication between the
wireless devices. Cloud computation has taken a giant leap into the mobile domain to cater …
wireless devices. Cloud computation has taken a giant leap into the mobile domain to cater …
Trust-zone-based end-to-end security
A Liu, B Venkataram, P Peng, B Kasman… - US Patent …, 2019 - Google Patents
Methods, electronic devices, and systems for exchanging encrypted information. A method
for exchanging encrypted information by an electronic device includes generating one or …
for exchanging encrypted information by an electronic device includes generating one or …