Trusted Computing Group

Results: 147



#Item
91System software / Trusted computing / Trusted Platform Module / Unified Extensible Firmware Interface / Trusted Computing Group / Personal computer hardware / SHA-1 / Computer security / BIOS / Computing

presented by Evolving Hardware-Based Security: Firmware Transition to TPM 2.0 UEFI Summerfest – July 15-19, 2013 Dick Wilkins, Ph.D.

Add to Reading List

Source URL: www.uefi.org

Language: English - Date: 2013-09-24 13:40:23
92Computer peripherals / Solid-state drive / Hardware-based full disk encryption / Hard disk drive / Trusted Computing Group / Encryption / Disk storage / Hybrid array / Computer hardware / Disk encryption / Computer storage media

SelfEncrypting Drive Market & Technology Report Thomas M. Coughlin Coughlin Associates, Inc.

Add to Reading List

Source URL: www.tomcoughlin.com

Language: English - Date: 2012-09-14 17:16:50
93Booting / Software / Unified Extensible Firmware Interface / EFI System partition / Trusted Computing Group / Trusted Platform Module / Trusted Computing / Portable Executable / Advanced Configuration and Power Interface / System software / BIOS / Computing

TCG EFI Protocol Version 1.20 Final Revision[removed]June, 2006 For TPM Family 1.1 or 1.2 Copyright © 2004, 2005, 2006 Trusted Computing Group, Incorporated.

Add to Reading List

Source URL: www.trustedcomputinggroup.org

Language: English - Date: 2009-04-01 20:52:25
94Trusted computing / Key management / Cryptographic protocols / Trusted Platform Module / Trusted Computing Group / Certificate authority / HTTP Secure / Public key certificate / Counter / Cryptography / Computer security / Public-key cryptography

Offline Untrusted Storage with Immediate Detection of Forking and Replay Attacks ∗ Marten van Dijk, Jonathan Rhodes, Luis F. G. Sarmenta, and Srinivas Devadas Computer Science and Artificial Intelligence Laboratory (CS

Add to Reading List

Source URL: projects.csail.mit.edu

Language: English - Date: 2007-08-28 16:29:40
95Trusted computing / Trusted Platform Module / Cryptographic nonce / Revocation list / Certificate authority / Counter / Transmission Control Protocol / Public key certificate / Trusted Computing Group / Cryptography / Public-key cryptography / Key management

Securing Shared Untrusted Storage by using TPM 1.2 Without Requiring a Trusted OS Marten van Dijk, Luis F. G. Sarmenta, Jonathan Rhodes, and Srinivas Devadas MIT Computer Science and Artificial Intelligence Laboratory (C

Add to Reading List

Source URL: csg.csail.mit.edu

Language: English - Date: 2007-05-24 15:48:08
96Booting / Computer architecture / Unified Extensible Firmware Interface / Boot loaders / Trusted Computing Group / Trusted Computing / Portable Executable / BIOS / System software / Computing

TCG EFI Platform Specification Version 1.20 Final Revision[removed]June 2006

Add to Reading List

Source URL: www.trustedcomputinggroup.org

Language: English - Date: 2009-04-01 20:51:50
97Trusted Computing Group / Trusted Platform Module / Direct Anonymous Attestation / TSS / Computer security / Cryptography / Trusted computing

TCG Software Stack (TSS) Specification Version 1.2 Level 1 Errata A Part1: Commands and Structures

Add to Reading List

Source URL: www.trustedcomputinggroup.org

Language: English - Date: 2009-04-01 21:38:38
98Error detection and correction / Cryptography / Cryptographic hash functions / Trusted Platform Module / Trusted Computing Group / Trusted Execution Technology / Next-Generation Secure Computing Base / Counter / Hash tree / Computer security / Trusted computing / Hashing

Virtual Monotonic Counters and Count-Limited Objects using a TPM without a Trusted OS ∗ Luis F. G. Sarmenta, Marten van Dijk, Charles W. O’Donnell, Jonathan Rhodes, and Srinivas Devadas

Add to Reading List

Source URL: projects.csail.mit.edu

Language: English - Date: 2006-08-31 18:21:40
99Computer security / Computing / MAAWG / Internet privacy / Domain Name System Security Extensions / Internet / Computer network security / National Strategy for Trusted Identities in Cyberspace

From: Messaging Anti-Abuse Working Group (MAAWG) Date: July 19, 2010 Subject: Comments on the National Strategy for Trusted Identities in Cyberspace Thank you for the opportunity to review and comment on the National Str

Add to Reading List

Source URL: www.maawg.org

Language: English - Date: 2010-11-23 17:52:45
100Finance / EMV / Smart card / Credit card / Debit card / Payment card / Interac / Direct Anonymous Attestation / Trusted Computing / Payment systems / Business / Money

e-EMV: Emulating EMV for Internet payments using Trusted Computing technology Shane Balfe and Kenneth G. Paterson, Information Security Group, Royal Holloway, University of London, Egham, Surrey, TW20 0EX, United Kingdom

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2008-02-29 12:44:11
UPDATE