First Page | Document Content | |
---|---|---|
![]() Date: 2009-03-28 00:28:27Disk encryption Trusted Platform Module Trusted Computing Group Computer network security Cryptographic software BitLocker Drive Encryption Trusted Network Connect Next-Generation Secure Computing Base Direct Anonymous Attestation Computer security Trusted computing Cryptography | Add to Reading List |
![]() | figures/spendorsementRATE.epsDocID: 1pOQH - View Document |
![]() | cTPM: A Cloud TPM for Cross-Device Trusted Applications Chen Chen† , Himanshu Raj, Stefan Saroiu, and Alec Wolman Microsoft Research and † CMU Current Trusted Platform Modules (TPMs) are illsuited for use in mobile sDocID: 1pqzt - View Document |
![]() | Advanced x86: BIOS and System Management Mode Internals Trusted Compu-ng Technologies Xeno Kovah && Corey Kallenberg LegbaCore, LLCDocID: 1nOjG - View Document |
![]() | Analysis of a Measured LaunchDocID: 1nJ8R - View Document |
![]() | information security technical report–138 available at www.sciencedirect.com www.compseconline.com/publications/prodinf.htmDocID: 1mRxb - View Document |