<--- Back to Details
First PageDocument Content
Trusted computing / Key management / Trusted Platform Module / Cryptographic software / Trusted Computing Group / BitLocker Drive Encryption / Key size / Key / Crypt / Cryptography / Computer security / Disk encryption
Date: 2013-09-26 17:29:37
Trusted computing
Key management
Trusted Platform Module
Cryptographic software
Trusted Computing Group
BitLocker Drive Encryption
Key size
Key
Crypt
Cryptography
Computer security
Disk encryption

Tech Digest Figure Template_1.5 column_01-06-12

Add to Reading List

Source URL: techdigest.jhuapl.edu

Download Document from Source Website

File Size: 727,24 KB

Share Document on Facebook

Similar Documents

Towards Verified C specification for TPM API Aybek Mukhamedov, Andy Gordon and Mark Ryan Trusted Platform Module

DocID: 1uVol - View Document

Towards a Verified Reference Implementation of a Trusted Platform Module Aybek Mukhamedov1,2 , Andrew D. Gordon1 , and Mark Ryan2 1 2

DocID: 1uKjY - View Document

Trusted Platform Module (TPM) Element Manager

DocID: 1sxEG - View Document

Computer security / Cryptography / Computing / Security / Trusted Platform Module / Data in use / Embedded system / Physical unclonable function / Trusted Computing / Software / Operating system / Key management

Secure Embedded Systems Michael Vai, David J. Whelihan, Benjamin R. Nahill, Daniil M. Utin, Sean R. O’Melia, and Roger I. Khazan Developers seek to seamlessly integrate cyber

DocID: 1qIlJ - View Document

Computing / Computer security / Computer networking / Trusted computing / Computer network security / Cyberwarfare / Data security / Firewall / Trusted Execution Technology / Network address translation / Trusted Platform Module / Packet processing

ETTM: A Scalable Fault Tolerant Network Manager Colin Dixon Hardeep Uppal Vjekoslav Brajkovic Dane Brandon Thomas Anderson Arvind Krishnamurthy University of Washington Abstract In this paper, we design, implement, and e

DocID: 1qxEz - View Document