Hardware security

Results: 1760



#Item
311Hypervisor / X86 virtualization / Virtualization / VM / Hardware-assisted virtualization / Popek and Goldberg virtualization requirements / System software / Software / Virtual machines

Guest Editors’ Introduction Virtualization and Security Back to the Future I

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2015-03-27 11:46:19
312Computer network security / Cyberwarfare / Social engineering / Spyware / Physical Unclonable Function / Computer security / Field-programmable gate array / Security / Trojan horses / Hardware Trojan

HOST2nd IEEE International Workshop on Hardware-Oriented Security and Trust July 27, 2009, Moscone Center, Room 304, San Francisco, CA

Add to Reading List

Source URL: www.engr.uconn.edu

Language: English - Date: 2009-10-29 22:42:52
313Device file / Key management / Entropy / /dev/random / Hardware random number generator / Random number generation / Key / Session key / Symmetric-key algorithm / Cryptography / Randomness / Pseudorandom number generators

Security not by chance: the AltusMetrum hardware true random number generator Tom Marble DebConf 14

Add to Reading List

Source URL: info9.net

Language: English - Date: 2014-08-27 11:34:09
314Computer networking / Forwarding plane / Computer network security / Packet Processing / Network processor / Transmission Control Protocol / Firewall / Latency / ARM architecture / Computing / Computer architecture / Networking hardware

Outline • Introduction • Application Partitioning • Generic Networking Equipment • Network Processor Focus

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2003-06-11 14:31:48
315Computer network security / Programming language implementation / Virtualization / Computer security / Hardware virtualization / Multiple single-level / System software / Software / Virtual machines

Information at all.nethttp://all.net/

Add to Reading List

Source URL: all.net

Language: English - Date: 2013-07-10 14:08:57
316Computer networking / Automation / Computer appliance / Manufacturing / Virtual appliance / Hypervisor / Hyper-V / Virtualization / Virtual security appliance / System software / Software / Virtual machines

Ricardo M. Matinata – Software Engineer – Linux Technology Center - Aug/2011 Implementing a Hardware Appliance Product: Applied usage of qemu/KVM and libvirt

Add to Reading List

Source URL: kvm.et.redhat.com

Language: English - Date: 2011-08-16 04:45:51
317Networking hardware / Computer network security / Internet protocols / Videotelephony / Router / Server appliance / Virtual private network / Virtual Router Redundancy Protocol / Voice over IP / Computing / Network architecture / Internet

DATASHEET Peplink  Balance  Multi-­WAN  Routers AT  A  GLANCE

Add to Reading List

Source URL: www.micronexis.com

Language: English - Date: 2013-04-07 05:38:09
318Hardware security module / Security / Cryptographic nonce / Block cipher / EAX mode / Cryptography / Block cipher modes of operation / One-time password

YubiHSM User Manual Version: 1.5.0 April 6, 2015 yubico

Add to Reading List

Source URL: www.yubico.com

Language: English - Date: 2015-04-13 14:47:47
319Hardware keylogger / Keystroke logging / National security / Wi-Fi / Universal Serial Bus / USB flash drive / Computer keyboard / Nintendo DS / Anti keylogger / Surveillance / Espionage / Computer hardware

KeyGrabber Nano Wi-Fi User’s Guide KeyGrabber Nano Wi-Fi

Add to Reading List

Source URL: www.keelog.com

Language: English - Date: 2015-04-13 13:02:58
320Networking hardware / Server appliance / Videotelephony / Internet standards / Computer network security / Dynamic DNS / Dynamic Host Configuration Protocol / Wireless security / IP address / Network architecture / Computing / Internet

Linksys Logo Portrait User Guide-blk

Add to Reading List

Source URL: www.rolan.si

Language: English - Date: 2009-10-27 07:46:27
UPDATE