<--- Back to Details
First PageDocument Content
Trusted computing / Microsoft Access / Computer file / Disk encryption / Cryptographic software / Trusted Platform Module / Trusted Computing Group / Computer security / Data management / Computing
Date: 2013-11-08 14:05:12
Trusted computing
Microsoft Access
Computer file
Disk encryption
Cryptographic software
Trusted Platform Module
Trusted Computing Group
Computer security
Data management
Computing

Add to Reading List

Source URL: www.trainfo.com

Download Document from Source Website

File Size: 117,50 KB

Share Document on Facebook

Similar Documents

Towards Verified C specification for TPM API Aybek Mukhamedov, Andy Gordon and Mark Ryan Trusted Platform Module

DocID: 1uVol - View Document

Towards a Verified Reference Implementation of a Trusted Platform Module Aybek Mukhamedov1,2 , Andrew D. Gordon1 , and Mark Ryan2 1 2

DocID: 1uKjY - View Document

Trusted Platform Module (TPM) Element Manager

DocID: 1sxEG - View Document

Computer security / Cryptography / Computing / Security / Trusted Platform Module / Data in use / Embedded system / Physical unclonable function / Trusted Computing / Software / Operating system / Key management

Secure Embedded Systems Michael Vai, David J. Whelihan, Benjamin R. Nahill, Daniil M. Utin, Sean R. O’Melia, and Roger I. Khazan Developers seek to seamlessly integrate cyber

DocID: 1qIlJ - View Document

Computing / Computer security / Computer networking / Trusted computing / Computer network security / Cyberwarfare / Data security / Firewall / Trusted Execution Technology / Network address translation / Trusted Platform Module / Packet processing

ETTM: A Scalable Fault Tolerant Network Manager Colin Dixon Hardeep Uppal Vjekoslav Brajkovic Dane Brandon Thomas Anderson Arvind Krishnamurthy University of Washington Abstract In this paper, we design, implement, and e

DocID: 1qxEz - View Document