Secure and trusted execution: Past, present, and future-a critical review in the context of the internet of things and cyber-physical systems

C Shepherd, G Arfaoui, I Gurulian… - 2016 IEEE Trustcom …, 2016 - ieeexplore.ieee.org
Notions like security, trust, and privacy are crucial in the digital environment and in the
future, with the advent of technologies like the Internet of Things (IoT) and Cyber-Physical …

Trusted mobile computing: An overview of existing solutions

MA Bouazzouni, E Conchon, F Peyrard - Future Generation Computer …, 2018 - Elsevier
Nowadays, smartphones are able to process large amounts of data enabling the use of
applications for personal or professional use. In these contexts, the smartphone needs to …

Pseudorandom number generation in smart cards: an implementation, performance and randomness analysis

RN Akram, K Markantonakis… - 2012 5th International …, 2012 - ieeexplore.ieee.org
Smart cards rely on pseudorandom number generators to provide uniqueness and
freshness in their cryptographic services ie encryption and digital signatures. Their …

Secure autonomous uavs fleets by using new specific embedded secure elements

RN Akram, PF Bonnefoi, S Chaumette… - 2016 IEEE Trustcom …, 2016 - ieeexplore.ieee.org
Unmanned Aerial Vehicles (UAVs) fleets are becoming more apparent in both military and
civilian applications. However security of these systems still remains unsatisfactory if a …

Method and device for managing a secure element

VK Marcovecchio, R Singh - US Patent 8,984,648, 2015 - Google Patents
A method and system for managing, from a communication device, a secure element for
contactless transactions such as mobile payment applications. The communication device …

Security, privacy and trust of user-centric solutions

RN Akram, HH Chen, J Lopez, D Sauveron… - Future Generation …, 2018 - Elsevier
With the development of pervasive and ubiquitous computing, of IoT and personal devices,
user-centric solutions will be the paradigm for most of the future applications. In this context …

Secure profile provisioning architecture for embedded UICC

J Park, K Baek, C Kang - 2013 International Conference on …, 2013 - ieeexplore.ieee.org
Embedded UICC (eUICC) is a new form of UICC, soldered into a device during
manufacturing. On the contrary to the traditional UICC, the eUICC is not fully controlled by …

Trusted platform module for smart cards

RN Akram, K Markantonakis… - 2014 6th International …, 2014 - ieeexplore.ieee.org
Near Field Communication (NFC)-based mobile phone services offer a lifeline to the under-
appreciated multiapplication smart card initiative. The initiative could effectively replace …

A dynamic and ubiquitous smart card security assurance and validation mechanism

RN Akram, K Markantonakis, K Mayes - … and Privacy–Silver Linings in the …, 2010 - Springer
Smart cards have been deployed as trusted components in a wide range of industries. The
basis of the trust on a smart card platform and applications is static and evaluated before the …

User centric security model for tamper-resistant devices

RN Akram, K Markantonakis… - 2011 IEEE 8th …, 2011 - ieeexplore.ieee.org
Tamper-resistant devices provide a secure, reliable, and trusted execution environment
even in the possession of an adversary. With ever growing use of computing platforms (ie …