Hardware security

Results: 1760



#Item
101COSIC / Advanced Encryption Standard / Key size

Cost of cryptography in hardware Ingrid Verbauwhede ingrid.verbauwhede-at-esat.kuleuven.be K.U.Leuven, ESAT- SCD - COSIC Computer Security and Industrial Cryptography

Add to Reading List

Source URL: ecc2011.loria.fr

Language: English - Date: 2011-09-30 12:40:06
102Computing / Concurrent computing / Parallel computing / GPGPU / Computer architecture / Video cards / Graphics hardware / Cryptography / Key derivation function / Scrypt / Brute-force attack / Password cracking

Security of Key Derivation Functions Ewerton Rodrigues Andrade Advisor: Prof. Dr. Marcos Antonio Simplicio Junior ´

Add to Reading List

Source URL: lyra2.net

Language: English - Date: 2014-01-07 11:26:38
103Software / Computing / System software / Hardware virtualization / Hypervisor / X86 virtualization / Virtualization / Virtual machine / VMware / Embedded hypervisor / Hardware-assisted virtualization

Machine Virtualization for Fun, Profit, and Security Muli Ben-Yehuda (Technion & IBM Research) Muli Ben-Yehuda Technion & IBM Research

Add to Reading List

Source URL: www.mulix.org

Language: English - Date: 2016-06-16 09:04:11
104Computing / Security / 107th United States Congress / Patriot Act / Cloud computing / Search engine optimization / Computer security

Customer Spotlight TM Patriot Technologies, Inc. provides secure, tailored hardware and software solutions to global customers. Patriot addresses all aspects of the technology

Add to Reading List

Source URL: www.contentmx.com

Language: English - Date: 2015-11-30 12:40:31
105Computer hardware / USB

Greenbone Security Manager Product Specifications GSM 600

Add to Reading List

Source URL: www.greenbone.net

Language: English - Date: 2016-06-16 08:24:26
106Computer security / Computing / Trusted computing / Cryptography / Windows Vista / Trusted Computing Group / Next-Generation Secure Computing Base / Grid computing / Proxy server / Rootkit / Virtualization / Hardware virtualization

information security technical report–138 available at www.sciencedirect.com www.compseconline.com/publications/prodinf.htm

Add to Reading List

Source URL: ipads.se.sjtu.edu.cn

Language: English - Date: 2012-01-05 23:25:04
107Computing / Computer hardware / Computer data storage / Computer storage devices / Backup / Data security / File server / Network-attached storage / Drive / Solid-state drive / Google Drive

Share Data Storage Agreement – S Drive 1.0 Overview This S Drive Storage Service Level Agreement (SLA) is between the University of Arkansas - Division of Agriculture and the faculty and staff using the S Drive storage

Add to Reading List

Source URL: agritech.uark.edu

Language: English - Date: 2015-10-27 11:40:24
108

SECURITY Magic Boxes and Boots: Security in Hardware

Add to Reading List

Source URL: www.ists.dartmouth.edu

Language: English - Date: 2008-09-11 13:37:43
    109Hyper-V / Windows Server / Xen / VM / Hardware virtualization / Hypervisor / Virtualization / QEMU / Virtual machine / Live migration / Temporal isolation among virtual machines / Embedded hypervisor

    Breaking Up is Hard to Do: Security and Functionality in a Commodity Hypervisor Patrick Colp†, Mihir Nanavati†, Jun Zhu‡, William Aiello†, George Coker∗, Tim Deegan‡, Peter Loscocco∗, and Andrew Warfield†

    Add to Reading List

    Source URL: tjd.phlegethon.org

    Language: English - Date: 2011-09-08 23:06:55
    110

    IP Access Control Assured Access. Complete Control. Synergis™ is the IP access control system that heightens your organization’s security, introduces you to non-proprietary hardware choices, and lets you go about yo

    Add to Reading List

    Source URL: www.genetec.com

    Language: English - Date: 2016-04-13 15:02:48
      UPDATE