Secure cryptoprocessor

Results: 19



#Item
11  Am I in good company? A privacy-protecting protocol for cooperating ubiquitous computing devices Oliver Stannard and Frank Stajano

1 Am I in good company? A privacy-protecting protocol for cooperating ubiquitous computing devices Oliver Stannard and Frank Stajano

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2012-06-23 18:45:47
2Low-cost Mitigation against Cold Boot Attacks for an Authentication Token Ian Goldberg?1 , Graeme Jenkinson2 , and Frank Stajano2 1  2

Low-cost Mitigation against Cold Boot Attacks for an Authentication Token Ian Goldberg?1 , Graeme Jenkinson2 , and Frank Stajano2 1 2

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2016-05-17 22:04:37
3CHAPTER  18 API Attacks One is happenstance; twice is coincidence; but three times is enemy action. — Goldfinger

CHAPTER 18 API Attacks One is happenstance; twice is coincidence; but three times is enemy action. — Goldfinger

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2008-04-27 09:57:39
4SECURITY  Magic Boxes and Boots: Security in Hardware

SECURITY Magic Boxes and Boots: Security in Hardware

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2005-08-19 15:35:31
5Fairy dust, secrets, and the real world - Security & Privacy Magazine, IEEE

Fairy dust, secrets, and the real world - Security & Privacy Magazine, IEEE

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2005-08-19 15:38:40
6the next-generation cryptographic platform for high-security products RedFox Cryptographic Platform Creating certified cryptographic products used to be a complex task,

the next-generation cryptographic platform for high-security products RedFox Cryptographic Platform Creating certified cryptographic products used to be a complex task,

Add to Reading List

Source URL: www.fox-it.com

Language: English - Date: 2015-04-22 11:55:15
7COVER FEATURE  Building the IBM 4758 Secure Coprocessor Meeting the challenge of building a user-configurable secure coprocessor

COVER FEATURE Building the IBM 4758 Secure Coprocessor Meeting the challenge of building a user-configurable secure coprocessor

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2005-08-18 17:47:54
8Microsoft PowerPoint[removed]20_cryptofirewall_cptwg.ppt

Microsoft PowerPoint[removed]20_cryptofirewall_cptwg.ppt

Add to Reading List

Source URL: www.cptwg.org

Language: English - Date: 2007-06-20 19:28:14
91  Hardware/Software Security Support R. R. Brooks, Associate Professor S. T. Sander, Assistant professor Holcombe Department of Electrical and Computer Engineering

1 Hardware/Software Security Support R. R. Brooks, Associate Professor S. T. Sander, Assistant professor Holcombe Department of Electrical and Computer Engineering

Add to Reading List

Source URL: www.ioc.ornl.gov

Language: English - Date: 2007-04-09 15:36:30
10Microsoft Word - 22c - DSE_D70_2005_D0268[removed]J-IDMARK64 - SecurityPolicy_13Oct06.doc

Microsoft Word - 22c - DSE_D70_2005_D0268[removed]J-IDMARK64 - SecurityPolicy_13Oct06.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00