Showing 1 - 20 results of 22 for search '"Secure Boot"', query time: 2.10s Refine Results
  1. 1
    by Ali Shuja Siddiqui, Yutian Gui, Fareena Saqib
    Published 2020-09-01
    Subjects: ...secure boot...
    Get full text
    Article
  2. 2
  3. 3
  4. 4
  5. 5
    by Markanovic, Michel, Persson, Simeon
    Published 2014
    Subjects: ...Secure Boot...
    Get full text
    Others
  6. 6
  7. 7
  8. 8
    by Chih-Huang Chang, 張志煌
    Published 2013
    ... an even wider range of aspects. Secure Boot can verify the completeness and security of files, and can...
    Get full text
    Others
  9. 9
  10. 10
  11. 11
    ...) based on 16 nm production technology. The devices are equipped with a secure boot mechanism in order...
    Get full text
    Article
  12. 12
    ...) based on 16 nm production technology. The devices are equipped with a secure boot mechanism in order...
    Get full text
    Article
  13. 13
    ...The secure boot-up and setup of Internet of Things (IoT) devices connected over the Cloud represent...
    Get full text
    Article
  14. 14
    by Wu Jin, Xu Jinfu
    Published 2018-09-01
    ... relationship and the reliability and security of secure boot on SoC system. The experimental results show...
    Get full text
    Article
  15. 15
    by Chang, Kaiye
    Published 2014
    ...Integrity protection on the Linux based Android Platform is examined. The secure boot mechanism...
    Get full text
    Others
  16. 16
  17. 17
    ... a secure boot and carry out mutual authentication processes with new owners and users that could add...
    Get full text
    Article
  18. 18
    by Schaller, André
    Published 2017
    ..., the proposed solutions comprise a secure boot architecture as well as an approach to protect the integrity...
    Get full text
    Get full text
    Others
  19. 19
    ... in embedded systems makes even more complicated attacks possible solutions were developed for secure boot...
    Get full text
  20. 20
    by Byman, G. (Gabriel)
    Published 2017
    ... of security. Then the enablers of security are established as secure boot, identification, authentication...
    Get full text
    Get full text
    Others