Suggested Topics within your search.
Suggested Topics within your search.
-
1
-
2
-
3by Don Owen, Derek Heeger, Calvin Chan, Wenjie Che, Fareena Saqib, Matt Areno, Jim PlusquellicSubjects: “...secure boot...”
Published 2018-07-01
Get full text
Article -
4
-
5
-
6
-
7
-
8“... an even wider range of aspects. Secure Boot can verify the completeness and security of files, and can...”
Get full text
Others -
9
-
10
-
11by Benjamin Hettwer, Sebastien Leger, Daniel Fennes, Stefan Gehrer, Tim Güneysu“...) based on 16 nm production technology. The devices are equipped with a secure boot mechanism in order...”
Published 2020-12-01
Get full text
Article -
12by Benjamin Hettwer, Sebastien Leger, Daniel Fennes, Stefan Gehrer, Tim Güneysu“...) based on 16 nm production technology. The devices are equipped with a secure boot mechanism in order...”
Published 2020-12-01
Get full text
Article -
13“...The secure boot-up and setup of Internet of Things (IoT) devices connected over the Cloud represent...”
Get full text
Article -
14“... relationship and the reliability and security of secure boot on SoC system. The experimental results show...”
Get full text
Article -
15by Chang, Kaiye“...Integrity protection on the Linux based Android Platform is examined. The secure boot mechanism...”
Published 2014
Get full text
Others -
16
-
17“... a secure boot and carry out mutual authentication processes with new owners and users that could add...”
Get full text
Article -
18by Schaller, André“..., the proposed solutions comprise a secure boot architecture as well as an approach to protect the integrity...”
Published 2017
Get full text
Get full text
Others -
19by Αντωνόπουλος, Αλέξανδρος“... in embedded systems makes even more complicated attacks possible solutions were developed for secure boot...”
Published 2014
Get full text
-
20by Byman, G. (Gabriel)“... of security. Then the enablers of security are established as secure boot, identification, authentication...”
Published 2017
Get full text
Get full text
Others