Trusted Computing Group

Results: 147



#Item
131Disk encryption / Malware / Rootkit / Trusted Platform Module / Trusted Computing Group / Cryptographic software / BitLocker Drive Encryption / Trusted Network Connect / Windows Vista / Computer security / Cyberwarfare / Trusted computing

Stopping Rootkits at the Network Edge January 2007

Add to Reading List

Source URL: www.trustedcomputinggroup.org

Language: English - Date: 2009-06-08 19:45:53
132Trusted Computing Group / Trusted Execution Technology / GlobalPlatform / Ring / BitLocker Drive Encryption / Next-Generation Secure Computing Base / Computer security / Trusted computing / Trusted Platform Module

WHITE PAPER: TPM MOBILE with Trusted Execution Environment for Comprehensive Mobile Device Security

Add to Reading List

Source URL: www.globalplatform.org

Language: English - Date: 2013-04-11 18:26:33
133Trusted Platform Module / Trusted Computing Group / Trusted Execution Technology / StrongSwan / Rapperswil / Next-Generation Secure Computing Base / Computer security / Trusted computing / Cryptography

A Root of Trust for Measurement

Add to Reading List

Source URL: security.hsr.ch

Language: English - Date: 2011-06-19 04:27:15
134Disk encryption / Windows Vista / Cryptographic software / Trusted computing / BitLocker Drive Encryption / Windows Server / Trusted Platform Module / Trusted Computing Group / Smart card / Microsoft Windows / Computer security / Computing

Penetration Testing Windows Vista BitLocker Drive Encryption

Add to Reading List

Source URL: www.secguru.com

Language: English - Date: 2006-09-25 10:42:17
135Computer network security / Trusted Computing Group / Password / Trusted Computing / Security token / Digital rights management / Malware / Next-Generation Secure Computing Base / Computer security / Copyright law / Security

The Need for TCPA David Safford, IBM Research, October, 2002

Add to Reading List

Source URL: www.research.ibm.com

Language: English - Date: 2003-04-16 11:17:28
136Trusted Computing / HMAC / Computer security / Cryptography / Trusted Computing Group

1 2

Add to Reading List

Source URL: www.trustedcomputinggroup.org

Language: English - Date: 2011-03-01 13:51:19
137Trusted Computing Group / Trusted Platform Module / TSS / Computer security / Trusted computing / Cryptography

TCG Specification Architecture Overview Specification

Add to Reading List

Source URL: www.trustedcomputinggroup.org

Language: English - Date: 2009-04-15 20:49:01
138Cryptography / Trusted Computing Group / Computer network security / Trusted Platform Module / Computer security / Security / Trusted computing

Trusted Computing Group Information – Version 2.0 Trusted Computing Group

Add to Reading List

Source URL: www.trustedcomputinggroup.org

Language: English - Date: 2009-03-30 19:42:38
139Microsoft Windows / Hardware-based full disk encryption / Encryption / USB flash drive / Trusted Computing Group / Backup / Cold boot attack / Trusted Computing / Password / Disk encryption / Cryptography / Computer security

Ten Reasons to Buy Self-Encrypting Drives September 2010

Add to Reading List

Source URL: www.trustedcomputinggroup.org

Language: English - Date: 2010-09-13 10:53:18
140Public-key cryptography / Key / Symmetric-key algorithm / One-time pad / Trusted Platform Module / Cryptography / Computer security / Trusted Computing

Trusted Computing IY5608: The RTM and the TPM Infrastructure Working Group Activity

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2007-02-14 11:20:25
UPDATE