Back to Results
First PageMeta Content
Central processing unit / Coprocessor / Acorn Computers / Internet protocols / Internet standards / Public-key cryptography / Transport Layer Security / IBM / HTTP cookie / Cryptography / Computing / Computer architecture


Practical server privacy with secure coprocessors by S. W. Smith D. Safford
Add to Reading List

Document Date: 2005-08-18 17:48:27


Open Document

File Size: 198,73 KB

Share Result on Facebook

Company

CBC / International Business Machines Corporation / CardNum / /

Currency

USD / /

Event

Product Issues / /

IndustryTerm

query processing time / distributed information services / computer-based and other information-service systems / server / server operator / private information server / inefficient algorithm / root-secure algorithm / encryption/decryption hardware / client infrastructure / secure file systems / secure coprocessor technology / straightforward algorithm / cryptographic applications / public key infrastructure / coprocessor applications / this with existing technology / Web interactions / enhancement Web / data mining / legacy Web servers / Web security / native hardware / sanctioned developer / oil / distributed Web services / software architecture / onboard applications / /

OperatingSystem

UNIX / Linux / /

Organization

Federal Bureau of Investigation / /

Position

Editor / researcher / /

Product

RAM / application code / /

PublishedMedium

the IBM SYSTEMS JOURNAL / /

Technology

encryption / root-secure algorithm / cryptography / RAM / public key infrastructure / Triple Data Encryption / enabling technology / following algorithm / secure coprocessor technology / Linux / UNIX / API / PKI / straightforward algorithm / 3 Coprocessor-based retrieval using Algorithm / Secure Hash Algorithm / data mining / Coprocessor-based retrieval using Algorithm / MP3 / random access / operating system / SSL / COTS technology / two algorithms / striping algorithm / /

SocialTag