<--- Back to Details
First PageDocument Content
Disk encryption / Trusted Platform Module / Trusted Computing Group / Computer network security / Cryptographic software / BitLocker Drive Encryption / Trusted Network Connect / Next-Generation Secure Computing Base / Direct Anonymous Attestation / Computer security / Trusted computing / Cryptography
Date: 2009-03-28 00:28:27
Disk encryption
Trusted Platform Module
Trusted Computing Group
Computer network security
Cryptographic software
BitLocker Drive Encryption
Trusted Network Connect
Next-Generation Secure Computing Base
Direct Anonymous Attestation
Computer security
Trusted computing
Cryptography

Trusted Platform Module (TPM)

Add to Reading List

Source URL: www.trustedcomputinggroup.org

Download Document from Source Website

File Size: 206,85 KB

Share Document on Facebook

Similar Documents

Geography of California / Business / Microsoft / Central Valley / Davis /  California / University of California /  Davis / Kuali Foundation / Request for proposal / Next-Generation Secure Computing Base

ADMAN Board of Directors Meeting Minutes December 17, p.mRobert Mondavi Institute, Room 1207

DocID: 1qwhJ - View Document

Health informatics / Electronic health records / Health Insurance Portability and Accountability Act / Data protection / Protected health information / Medical privacy / Next-Generation Secure Computing Base / Privacy / Medical record / Information privacy / Health Information Technology for Economic and Clinical Health Act / National Provider Identifier

DOC Document

DocID: 1p15y - View Document

Computer security / Computing / Trusted computing / Cryptography / Windows Vista / Trusted Computing Group / Next-Generation Secure Computing Base / Grid computing / Proxy server / Rootkit / Virtualization / Hardware virtualization

information security technical report–138 available at www.sciencedirect.com www.compseconline.com/publications/prodinf.htm

DocID: 1mRxb - View Document

Trusted computing / Hardware security module / Secure cryptoprocessor / Automated teller machine / EMV / Next-Generation Secure Computing Base / Smart card / Trusted Platform Module / Security of automated teller machines / Cryptography / Computer security / Espionage

CHAPTER 18 API Attacks One is happenstance; twice is coincidence; but three times is enemy action. — Goldfinger

DocID: 19URM - View Document

Trusted computing / Microkernel / Security / Trusted computing base / Kernel / Trusted path / L4 microkernel family / Next-Generation Secure Computing Base / Ring / Computer security / Computer architecture / System software

To be published in Proceedings of the 11th ACM SIGOPS European Workshop, Leuven, Belgium, 2004 Reducing TCB size by using untrusted components — small kernels versus virtual-machine monitors Michael Hohmuth

DocID: 18m73 - View Document