Trusted Computing Group

Results: 147



#Item
1Cryptography / Public-key cryptography / Public key infrastructure / Key management / E-commerce / Group signature / Trusted Computing / Certificate authority / Anonymity / Digital signature / Public key certificate / Direct Anonymous Attestation

figures/spendorsementRATE.eps

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-05-29 15:38:01
2Disk encryption / Trusted computing / Trusted Platform Module / Cryptography / Windows Vista / Trusted Computing Group / BitLocker / Cloud computing / Cloud storage / Trusted Execution Technology

cTPM: A Cloud TPM for Cross-Device Trusted Applications Chen Chen† , Himanshu Raj, Stefan Saroiu, and Alec Wolman Microsoft Research and † CMU Current Trusted Platform Modules (TPMs) are illsuited for use in mobile s

Add to Reading List

Source URL: www.netsec.ethz.ch

Language: English - Date: 2015-06-01 09:06:12
3Cryptography / Computer security / Microsoft Windows / Cryptographic software / Trusted computing / Disk encryption / Windows Vista / Trusted Platform Module / BitLocker / Unified Extensible Firmware Interface / Booting / Trusted Computing Group

Advanced  x86:   BIOS  and  System  Management  Mode  Internals   Trusted  Compu-ng  Technologies   Xeno  Kovah  &&  Corey  Kallenberg   LegbaCore,  LLC  

Add to Reading List

Source URL: opensecuritytraining.info

Language: English - Date: 2015-10-14 22:12:02
4Computer architecture / Computer security / System software / Trusted computing / Operating system kernels / Boot loaders / Cryptographic software / Trusted Platform Module / Trusted Execution Technology / Trusted Computing Group / Loadable kernel module / Loader

Analysis of a Measured Launch

Add to Reading List

Source URL: evenmere.org

Language: English - Date: 2008-06-23 13:59:25
5Computer security / Computing / Trusted computing / Cryptography / Windows Vista / Trusted Computing Group / Next-Generation Secure Computing Base / Grid computing / Proxy server / Rootkit / Virtualization / Hardware virtualization

information security technical report–138 available at www.sciencedirect.com www.compseconline.com/publications/prodinf.htm

Add to Reading List

Source URL: ipads.se.sjtu.edu.cn

Language: English - Date: 2012-01-05 23:25:04
6Business / Economy / Trusted Platform Module / Trusted computing / Phoenix Technologies / CA Technologies / Compaq / Trusted Computing Group

Trusted Computing Platform Alliance: The Mother(board) of all Big Brothers Lucky Green cypherpunks.to

Add to Reading List

Source URL: www.cypherpunks.to

Language: English - Date: 2011-09-20 13:07:03
7

ARCHITECT’S GUIDE: CYBERSECURITY October 2013 Trusted Computing Group 3855 SW 153rd Drive Beaverton, OR 97006

Add to Reading List

Source URL: www.trustedcomputinggroup.org

Language: English - Date: 2013-12-06 18:21:27
    8Cyberwarfare / Trusted computing / Crime prevention / National security / Trusted Platform Module / IF-MAP / Trusted Computing Group / Trusted Network Connect / Network security / Computer security / Security / Computer network security

    ARCHITECT’S GUIDE: CYBERSECURITY October 2013 Trusted Computing Group 3855 SW 153rd Drive Beaverton, OR 97006

    Add to Reading List

    Source URL: www.trustedcomputinggroup.org

    Language: English - Date: 2013-12-06 18:21:27
    9

    ARCHITECT’S GUIDE: ICS SECURITY USING TNC TECHNOLOGY October 2013 Trusted Computing Group 3855 SW 153rd Drive Beaverton, OR 97006

    Add to Reading List

    Source URL: www.trustedcomputinggroup.org

    Language: English - Date: 2013-11-06 16:49:30
      10Trusted Platform Module / Trusted Computing Group / Advanced Micro Devices / Intel / Computer security / Trusted computing / Cryptography

      Trusted Platform Module Library Part 1: Architecture Family “2.0” Level 00 RevisionOctober 30, 2014

      Add to Reading List

      Source URL: www.trustedcomputinggroup.org

      Language: English - Date: 2014-11-07 17:19:25
      UPDATE