Srinivas

Results: 235



#Item
181Trusted computing / Trusted Platform Module / Cryptographic nonce / Revocation list / Certificate authority / Counter / Transmission Control Protocol / Public key certificate / Trusted Computing Group / Cryptography / Public-key cryptography / Key management

Securing Shared Untrusted Storage by using TPM 1.2 Without Requiring a Trusted OS Marten van Dijk, Luis F. G. Sarmenta, Jonathan Rhodes, and Srinivas Devadas MIT Computer Science and Artificial Intelligence Laboratory (C

Add to Reading List

Source URL: csg.csail.mit.edu

Language: English - Date: 2007-05-24 15:48:08
182Microsoft Excel / Software

FTABLE-BUILDER TUTORIAL Yusuf M. Mohamoud and Srinivas Motamarri Ecosystems Research Division National Exposure Research Laboratory Office of Research and Development

Add to Reading List

Source URL: www.epa.gov

Language: English - Date: 2013-09-03 15:22:49
183Trusted computing / Smart cards / Public-key cryptography / Closure / Subroutines / Trusted Platform Module / Variable / Java Card / Trusted Execution Technology / Cryptography / Computer security / Computing

The Trusted Execution Module: Commodity General-Purpose Trusted Computing Victor Costan, Luis F. G. Sarmenta, Marten van Dijk, and Srinivas Devadas MIT Computer Science and Artificial Intelligence Laboratory, Cambridge,

Add to Reading List

Source URL: projects.csail.mit.edu

Language: English - Date: 2008-09-09 21:32:55
184Healthcare / Health promotion / Health education / North Central Association of Colleges and Schools / Service-learning / Allied health professions / Health care provider / American Medical Student Association / The National AHEC Program / Health / Education / Medicine

TRACK 8 Social Change through Student Leadership and Activism written by David Grande, American Medical Student Association, Reston, VA Sindhu Srinivas, American Medical Student Association, Reston, VA

Add to Reading List

Source URL: depts.washington.edu

Language: English - Date: 2004-03-04 19:29:00
185Error detection and correction / Cryptography / Cryptographic hash functions / Trusted Platform Module / Trusted Computing Group / Trusted Execution Technology / Next-Generation Secure Computing Base / Counter / Hash tree / Computer security / Trusted computing / Hashing

Virtual Monotonic Counters and Count-Limited Objects using a TPM without a Trusted OS ∗ Luis F. G. Sarmenta, Marten van Dijk, Charles W. O’Donnell, Jonathan Rhodes, and Srinivas Devadas

Add to Reading List

Source URL: projects.csail.mit.edu

Language: English - Date: 2006-08-31 18:21:40
186Pakistani cuisine / Bengali cuisine / Malaysian cuisine / Punjabi cuisine / Sri Lankan cuisine / Indian cuisine / Curry / Biryani / South Asian cuisine / Cuisine / Asian culture / Asian cuisine

Food, Culture, and Asia Exploring Indian Culture through Food By Tulasi Srinivas F

Add to Reading List

Source URL: www.asian-studies.org

Language: English - Date: 2014-07-15 11:27:01
187Windows Server / Cypherpunks / Niels Provos / Year of birth missing / Hyper-V / Hypervisor / Data center / Monrose / Router / System software / Computing / Software

Srinivas Krishnan 105 Fidelity St, Apt A50, Carrboro NC[removed]Phone: [removed]E-Mail: [removed] Interests Large-scale network systems, Virtualization Security, Data and Performance analysis, Security analys

Add to Reading List

Source URL: wwwx.cs.unc.edu

Language: English - Date: 2011-08-17 21:51:44
188Error detection and correction / Cryptography / Computing / Security / Hash tree / Venti / Trusted Platform Module / Cache / Hash list / Hashing / Computer security / Cryptographic hash functions

Authenticated Storage Using Small Trusted Hardware Hsin-Jung Yang, Victor Costan, Nickolai Zeldovich, and Srinivas Devadas Computer Science and Artificial Intelligence Laboratory Massachusetts Institute of Technology Cam

Add to Reading List

Source URL: people.csail.mit.edu

Language: English
189Xen / Hardware virtualization / Hypervisor / Hyper-V / Virtualization / Rootkit / Page table / Kernel / OpenVZ / System software / Software / Virtual machines

Trail of Bytes: Efficient Support for Forensic Analysis Srinivas Krishnan Kevin Snow Fabian Monrose

Add to Reading List

Source URL: cs.unc.edu

Language: English - Date: 2011-04-18 21:55:17
190Virtual memory / University of Cambridge Computer Laboratory / Xen / Hyper-V / Rootkit / Hypervisor / Virtualization / Hardware virtualization / Device file / System software / Software / Virtual machines

1 Trail of Bytes: New Techniques for Supporting Data Provenance and Limiting Privacy Breaches Srinivas Krishnan, Member, IEEE, Kevin Z. Snow, and Fabian Monrose

Add to Reading List

Source URL: cs.unc.edu

Language: English - Date: 2012-08-20 14:10:31
UPDATE