Secure and trusted execution: Past, present, and future-a critical review in the context of the internet of things and cyber-physical systems
Notions like security, trust, and privacy are crucial in the digital environment and in the
future, with the advent of technologies like the Internet of Things (IoT) and Cyber-Physical …
future, with the advent of technologies like the Internet of Things (IoT) and Cyber-Physical …
Trusted mobile computing: An overview of existing solutions
Nowadays, smartphones are able to process large amounts of data enabling the use of
applications for personal or professional use. In these contexts, the smartphone needs to …
applications for personal or professional use. In these contexts, the smartphone needs to …
Pseudorandom number generation in smart cards: an implementation, performance and randomness analysis
Smart cards rely on pseudorandom number generators to provide uniqueness and
freshness in their cryptographic services ie encryption and digital signatures. Their …
freshness in their cryptographic services ie encryption and digital signatures. Their …
Secure autonomous uavs fleets by using new specific embedded secure elements
RN Akram, PF Bonnefoi, S Chaumette… - 2016 IEEE Trustcom …, 2016 - ieeexplore.ieee.org
Unmanned Aerial Vehicles (UAVs) fleets are becoming more apparent in both military and
civilian applications. However security of these systems still remains unsatisfactory if a …
civilian applications. However security of these systems still remains unsatisfactory if a …
Method and device for managing a secure element
VK Marcovecchio, R Singh - US Patent 8,984,648, 2015 - Google Patents
A method and system for managing, from a communication device, a secure element for
contactless transactions such as mobile payment applications. The communication device …
contactless transactions such as mobile payment applications. The communication device …
Security, privacy and trust of user-centric solutions
With the development of pervasive and ubiquitous computing, of IoT and personal devices,
user-centric solutions will be the paradigm for most of the future applications. In this context …
user-centric solutions will be the paradigm for most of the future applications. In this context …
Secure profile provisioning architecture for embedded UICC
J Park, K Baek, C Kang - 2013 International Conference on …, 2013 - ieeexplore.ieee.org
Embedded UICC (eUICC) is a new form of UICC, soldered into a device during
manufacturing. On the contrary to the traditional UICC, the eUICC is not fully controlled by …
manufacturing. On the contrary to the traditional UICC, the eUICC is not fully controlled by …
Trusted platform module for smart cards
Near Field Communication (NFC)-based mobile phone services offer a lifeline to the under-
appreciated multiapplication smart card initiative. The initiative could effectively replace …
appreciated multiapplication smart card initiative. The initiative could effectively replace …
A dynamic and ubiquitous smart card security assurance and validation mechanism
Smart cards have been deployed as trusted components in a wide range of industries. The
basis of the trust on a smart card platform and applications is static and evaluated before the …
basis of the trust on a smart card platform and applications is static and evaluated before the …
User centric security model for tamper-resistant devices
Tamper-resistant devices provide a secure, reliable, and trusted execution environment
even in the possession of an adversary. With ever growing use of computing platforms (ie …
even in the possession of an adversary. With ever growing use of computing platforms (ie …