His primary areas of investigation include Computer security, Authentication, Embedded system, Operating system and Computer network. His Computer security study incorporates themes from Identifier and Service provider. His Authentication study integrates concerns from other disciplines, such as Credential, Key, Role-based access control and Biometrics.
His work deals with themes such as Security policy, Kernel, System software and Partition, which intersect with Embedded system. His Computer network research is multidisciplinary, incorporating perspectives in Communication channel and Personalization. His Trusted Platform Module research integrates issues from Trusted Computing, Direct Anonymous Attestation, Trusted Network Connect, Virtual machine and Encryption.
His primary scientific interests are in Computer network, Computer security, Operating system, Authentication and Key. His Computer network research incorporates elements of Enhanced Data Rates for GSM Evolution and Edge computing. His biological study spans a wide range of topics, including Service provider, Database transaction and Protocol.
His research integrates issues of Computer hardware and Embedded system in his study of Operating system. His studies in Authentication integrate themes in fields like Security token and Credential. His research in Trusted Platform Module intersects with topics in Trusted Network Connect and Direct Anonymous Attestation.
Ned M. Smith mainly focuses on Computer network, Enhanced Data Rates for GSM Evolution, Edge computing, Computer security and Node. His study in the fields of Network packet, Encryption, Identifier and Authentication under the domain of Computer network overlaps with other disciplines such as Onboarding. His work on Encryption is being expanded to include thematically relevant topics such as Key.
Ned M. Smith usually deals with Authentication and limits it to topics linked to Security token and Request–response, Name server, Access control list and Credential. His Computer security study is mostly concerned with Blockchain and Cryptography. In his study, Digital economy is strongly linked to Cloud computing, which falls under the umbrella field of Node.
Ned M. Smith mostly deals with Computer network, Enhanced Data Rates for GSM Evolution, Edge computing, Blockchain and Computer security. His work carried out in the field of Computer network brings together such families of science as Communication interface, Hash function, Cloud computing and Identification. The various areas that Ned M. Smith examines in his Enhanced Data Rates for GSM Evolution study include Identifier, Application lifecycle management, Distributed Computing Environment and Authorization.
His study on Edge computing also encompasses disciplines like
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Hardware-based device authentication
Vincent Edward Von Bokern;Purushottam Goel;Sven Schrecker;Ned McArthur Smith.
(2012)
Hardware-based device authentication
Vincent Edward Von Bokern;Purushottam Goel;Sven Schrecker;Ned McArthur Smith.
(2012)
Providing Integrity Verification And Attestation In A Hidden Execution Environment
Ned M. Smith;Vedvyas Shanbhogue;Arvind Kumar;Purushottam Goel.
(2010)
Providing Integrity Verification And Attestation In A Hidden Execution Environment
Ned M. Smith;Vedvyas Shanbhogue;Arvind Kumar;Purushottam Goel.
(2010)
Cloud-Based Commissioning of Constrained Devices using Permissioned Blockchains
Thomas Hardjono;Ned Smith.
Proceedings of the 2nd ACM International Workshop on IoT Privacy, Trust, and Security (2016)
Cloud-Based Commissioning of Constrained Devices using Permissioned Blockchains
Thomas Hardjono;Ned Smith.
Proceedings of the 2nd ACM International Workshop on IoT Privacy, Trust, and Security (2016)
System and method for combining user and platform authentication in negotiated channel security protocols
Ned M. Smith.
(2009)
System and method for combining user and platform authentication in negotiated channel security protocols
Ned M. Smith.
(2009)
Protected device management
Smit Ned M;Mur Viktorija K;Grobmehn Stiven L.
(2010)
Protected device management
Ned M. Smith;Victoria C. Moore;Steven L. Grobman.
(2010)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below:
Intel (United States)
ICE Mortgage Technology
Intel (United States)
Intel (United States)
Binghamton University
Intel (United States)
Carnegie Mellon University
University of Richmond
KU Leuven
Princeton University
Georgia Institute of Technology
Beijing University of Posts and Telecommunications
Sojo University
University of Oslo
Pennsylvania State University
Tel Aviv University
University of Oxford
University of Chicago
Indonesian Institute of Sciences
Beth Israel Deaconess Medical Center
Erasmus MC
Yale University