What is a (digital) identity wallet? a systematic literature review

B Podgorelec, L Alber, T Zefferer - 2022 IEEE 46th Annual …, 2022 - ieeexplore.ieee.org
Identity management is crucial for any electronic service that needs to authenticate its users.
Different identity-management models have been introduced and rolled out on a large scale …

[图书][B] Bootstrapping trust in modern computers

B Parno, JM McCune, A Perrig - 2011 - books.google.com
Trusting a computer for a security-sensitive task (such as checking email or banking online)
requires the user to know something about the computer's state. We examine research on …

Mobile trusted computing

N Asokan, JE Ekberg, K Kostiainen… - Proceedings of the …, 2014 - ieeexplore.ieee.org
Trusted computing technologies for mobile devices have been researched, developed, and
deployed over the past decade. Although their use has been limited so far, ongoing …

{cTPM}: A cloud {TPM} for {Cross-Device} trusted applications

C Chen, H Raj, S Saroiu, A Wolman - 11th USENIX Symposium on …, 2014 - usenix.org
Current Trusted Platform Modules (TPMs) are ill-suited for cross-device scenarios in trusted
mobile applications because they hinder the seamless sharing of data across multiple …

Hardware security for device authentication in the smart grid

AJ Paverd, AP Martin - International Workshop on Smart Grid Security, 2012 - Springer
Secure communication between devices is a key aspect of smart grid security. In the future
smart home environment, various smart devices, appliances and energy management …

System and method for securely registering a recipient to a computer-implemented funds transfer payment network

K Bouey, SS Muthu, BM Pearce, A Vancini - US Patent 11,361,290, 2022 - Google Patents
A method including storing a record in an information directory of a computer system. The
method also includes receiving a confirmation that a particular identifier of the one or more …

TruWalletM: Secure web authentication on mobile platforms

S Bugiel, A Dmitrienko, K Kostiainen… - … , INTRUST 2010, Beijing …, 2011 - Springer
Mobile phones are increasingly used as general purpose computing devices with
permanent Internet connection. This imposes several threats as the phone operating system …

Towards user-friendly credential transfer on open credential platforms

K Kostiainen, N Asokan, A Afanasyeva - … ACNS 2011, Nerja, Spain, June 7 …, 2011 - Springer
Hardware-based “trusted execution environments”(TrEEs) are becoming widely available
and open credentials platforms allow any service provider to issue credentials to such …

KISS:“key it simple and secure” corporate key management

Z Zhou, J Han, YH Lin, A Perrig, V Gligor - … 2013, London, UK, June 17-19 …, 2013 - Springer
Deploying a corporate key management system faces fundamental challenges, such as fine-
grained key usage control and secure system administration. None of the current …

Trusted computing enhanced openid

A Leicher, AU Schmidt, Y Shah… - … Conference for Internet …, 2010 - ieeexplore.ieee.org
Trusted Computing, used as a security technology, can establish trust between multiple
parties. One implementation of Trusted Computing Technology standardized by the Trusted …