نتایج جستجو برای: tpm
تعداد نتایج: 1307 فیلتر نتایج به سال:
We present a Trusted Platform Module (TPM) application protocol that detects a certain man in the middle attack where an adversary captures and replaces a legitimate computing platform with an imposter that forwards platform authentication challenges to the captive over a high speed data link. This revised Cuckoo attack allows the imposter to satisfy a user’s query of platform integrity, tricki...
OBJECTIVE Two of the most commonly prescribed new antiepileptic drugs as add-on therapy for patients with chronic refractory epilepsies are topiramate and levetiracetam. In regulatory trials, both drugs were characterized as very promising new antiepileptic drugs. However, results from these highly controlled short-term clinical trials cannot simply be extrapolated to everyday clinical practice...
The preparation, single-crystal X-ray crystallography and magnetic properties are reported for two tetranuclear cluster complexes based on [W(V)(CN)(8)](3-) octacyanometallates. Reactions of [W(V)(CN)(8)](3-) with Co(II) ions in the presence of the capping ligand tpm (tpm = tri(1H-pyrazol-1-yl)methane) lead to the formation of complex 1 [(tpm)(2)Co(II)][W(V)(2)(CN)(16)Co(2)(tpm)(2)(H(2)O)(2)].4...
Past decade has witnessed the availability of Trusted Platform Modules (TPM) on commodity computers. While the most common use of TPM appears to be BitLocker on Windows OS, server class motherboards have not yet enjoyed a similar TPM deployment base. Recent research and products show that the TPM can provide a level of trust on locally executing software. Nonetheless, TPMs haven’t been utilized...
The privacy-CA solution (PCAS) designed by the Trusted Computing Group (TCG) was specified in TCG Trusted Platform Module (TPM) Specification Version 1.2 in 2003 and allows a TPM to obtain from a certification authority (CA) certificates on short term keys. The PCAS protocol is a lighter alternative to the Direct Anonymous Attestation (DAA) scheme for anonymous platform authentication. The firs...
Given the limited resources and computational power of current embedded sensor devices memory protection is difficult to achieve and generally unavailable. Hence, the buffer overflow that is used by the worm attacks in the Internet can be easily exploited to inject malicious code into Wireless Sensor Networks (WSNs). We designed a hardware-based remote attestation protocol to counter the buffer...
Our main observation concerns closed geodesics on surfaces M with a smooth Finsler metric, i.e. a function F : TM → [0,∞) which is a norm on each tangent space TpM , p ∈ M , which is smooth outside of the zero section in TM , and which is strictly convex in the sense that Hess(F ) is positive definite on TpM \ {0}. One calls a Finsler metric F symmetric if F (p,−v) = F (p, v) for all v ∈ TpM . ...
Background: Obesity is a serious chronic disease. Controlled-release phentermine/topiramate (PHEN/TPM CR), as an adjunct to lifestyle modification, has previously shown significant weight loss compared with placebo in a 56-wk study in overweight and obese subjects with 2 weight-related comorbidities. Objective: This study evaluated the long-term efficacy and safety of PHEN/TPM CR in overweight ...
The actin cytoskeleton is the primary polymer system within cells responsible for regulating cellular stiffness. While various actin binding proteins regulate the organization and dynamics of the actin cytoskeleton, the proteins responsible for regulating the mechanical properties of cells are still not fully understood. In the present study, we have addressed the significance of the actin asso...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید