Trusted Computing Group

Results: 147



#Item
101File sharing networks / File sharing / Distributed data storage / Peer-to-peer computing / Distributed algorithms / Peer-to-peer / ANts P2P / Social peer-to-peer processes / HTTP / Computing / Concurrent computing / Distributed computing

Securing Peer-to-Peer Networks Using Trusted Computing Shane Balfe, Amit D. Lakhani and Kenneth G. Paterson, Information Security Group, Royal Holloway, University of London, Egham, Surrey, TW20 0EX, United Kingdom.

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2005-01-31 10:46:54
102Trusted computing / Cryptography / File sharing networks / Internet privacy / Direct Anonymous Attestation / Peer-to-peer computing / Trusted Platform Module / Peer-to-peer / Social peer-to-peer processes / Computer security / Computing / Concurrent computing

Trusted Computing: Providing Security for Peer-to-Peer Networks Shane Balfe, Amit D. Lakhani and Kenneth G. Paterson, Information Security Group, Royal Holloway, University of London, United Kingdom. {S.Balfe,Amit.Lakhan

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2005-06-23 08:33:02
103Trusted Platform Module / Trusted computing base / Virtual machine / Ring / Rootkit / Trusted Execution Technology / Trusted Computing Group / Computer security / Trusted computing / Cryptography

TrustVisor: Efficient TCB Reduction and Attestation Jonathan M. McCune, Ning Qu, Yanlin Li Anupam Datta, Virgil D. Gligor, Adrian Perrig March 9, 2009 (revised March 10, 2010)

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2010-07-09 18:37:15
104Interoperability / Standards map / Computing / Electronics / Telecommunications / Computer network security / National Strategy for Trusted Identities in Cyberspace

Management Council, Plenary, Committee, and Working Group Roles and Participation

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2012-03-20 17:39:49
105Cryptography / Open Vulnerability and Assessment Language / TPM / Trusted Computing Group / Trusted Execution Technology / Computer security / Trusted computing / Trusted Platform Module

OVAL + The Trusted Platform Module Charles Schmidt June 14, 2010 © 2008 The MITRE Corporation. All rights reserved

Add to Reading List

Source URL: oval.mitre.org

Language: English - Date: 2010-06-16 09:55:57
106Trusted Computing Group / Trusted Execution Technology / Ring / Firmware / Booting / Operating system / BitLocker Drive Encryption / Disk encryption / Computer security / Trusted computing / Trusted Platform Module

Trusted Mobile Devices: Requirements for a Mobile Trusted Platform Module Kathleen N. McGill n recent years, mobile devices have replaced desktop PCs as the computing platform of choice for many users. Unfortunately, mos

Add to Reading List

Source URL: techdigest.jhuapl.edu

Language: English - Date: 2013-09-26 17:27:04
107Trusted Computing Group / Trusted Execution Technology / Ring / Firmware / Booting / Operating system / BitLocker Drive Encryption / Disk encryption / Computer security / Trusted computing / Trusted Platform Module

Trusted Mobile Devices: Requirements for a Mobile Trusted Platform Module Kathleen N. McGill n recent years, mobile devices have replaced desktop PCs as the computing platform of choice for many users. Unfortunately, mos

Add to Reading List

Source URL: www.jhuapl.edu

Language: English - Date: 2013-09-26 17:27:04
108Trusted computing / Key management / Trusted Platform Module / Cryptographic software / Trusted Computing Group / BitLocker Drive Encryption / Key size / Key / Crypt / Cryptography / Computer security / Disk encryption

Tech Digest Figure Template_1.5 column_01-06-12

Add to Reading List

Source URL: www.jhuapl.edu

Language: English - Date: 2013-09-26 17:29:37
109Cyberwarfare / Trusted Network Connect / IEEE 802.1X / Network Access Control / RADIUS / Extensible Authentication Protocol / Juniper Networks / Trusted Computing Group / Wireless access point / Computer network security / Computer security / Computing

White Paper The Importance of Standards to Network Access Control Juniper Networks, Inc.

Add to Reading List

Source URL: www.opus1.com

Language: English - Date: 2008-04-28 05:03:54
110Trusted computing / FIPS 140-2 / Trusted Platform Module / FIPS 140 / Hardware security module / Trusted Computing Group / Critical Security Parameter / Microsoft CryptoAPI / IBM / Computer security / Cryptography / Espionage

Secure64 Cryptographic Module Non-Proprietary Security Policy FIPS[removed]Level 2 For Version 1.2 December 2, 2009

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2009-12-31 00:00:00
UPDATE