Trusted Computing

Results: 881



#Item
151Embedded Linux / Smartphones / Java platform / Android / Type system / Apache Ant / Java / Software / Computing / Cross-platform software

SPARTA! Static Program Analysis for Reliable Trusted Apps http://types.cs.washington.edu/sparta/ VersionDec 2014) Contents

Add to Reading List

Source URL: types.cs.washington.edu

Language: English - Date: 2014-12-29 14:17:49
152Embedded Linux / Smartphones / Java platform / Android / Type system / Apache Ant / Java / Software / Computing / Cross-platform software

SPARTA! Static Program Analysis for Reliable Trusted Apps http://types.cs.washington.edu/sparta/ VersionApril 2015) Contents

Add to Reading List

Source URL: types.cs.washington.edu

Language: English - Date: 2015-04-24 14:10:02
153Embedded Linux / Cloud clients / Android / Apache Ant / Application software / JAR / Software / Computing / Smartphones

SPARTA! Static Program Analysis for Reliable Trusted Apps http://types.cs.washington.edu/sparta/ VersionDecember 2013) Contents

Add to Reading List

Source URL: types.cs.washington.edu

Language: English - Date: 2013-12-13 10:11:27
154Private information retrieval / Trusted Computing / Tor / Public-key cryptography / Privacy / Server / Secure multi-party computation / Proxy server / Cryptography / Cryptographic protocols / Internet privacy

Private Information Retrieval Techniques for Enabling Location Privacy in Location-Based Services? Ali Khoshgozaran and Cyrus Shahabi University of Southern California Department of Computer Science

Add to Reading List

Source URL: infolab.usc.edu

Language: English - Date: 2009-11-05 01:09:05
155Trusted Computing Group / Trusted Platform Module / Cryptography / Rootkit / Computer security / Cyberwarfare / Trusted computing

The Diversity of TPMs and its Effects on Development A Case Study of Integrating the TPM into OpenSolaris ∗ Anna Shubina

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2010-11-09 19:13:24
156National security / Ethics / Cryptography / Trusted Computing Group / Trusted Computing / Privacy / Intel / European Network and Information Security Agency / Information security / Security / Computer security / Crime prevention

Claire Vishik Trust & Security Technology & Policy Manager Intel Corporation Dr. Claire Vishik works at Intel Corporation focuses on hardware security, trusted computing, privacy enhancing technologies, some aspects of e

Add to Reading List

Source URL: www.trustindigitallife.eu

Language: English - Date: 2015-03-19 08:36:15
157Trusted computing / Microkernel / Security / Trusted computing base / Kernel / Trusted path / L4 microkernel family / Next-Generation Secure Computing Base / Ring / Computer security / Computer architecture / System software

To be published in Proceedings of the 11th ACM SIGOPS European Workshop, Leuven, Belgium, 2004 Reducing TCB size by using untrusted components — small kernels versus virtual-machine monitors Michael Hohmuth

Add to Reading List

Source URL: www.eros-os.org

Language: English - Date: 2005-10-18 08:59:18
158Embedded Linux / Smartphones / Java platform / Android / Type system / Apache Ant / Java / Software / Computing / Cross-platform software

SPARTA! Static Program Analysis for Reliable Trusted Apps http://types.cs.washington.edu/sparta/ VersionNovember 2014) Contents

Add to Reading List

Source URL: types.cs.washington.edu

Language: English - Date: 2014-11-14 19:27:33
159Software testing / Hacking / Black Hat Briefings / David Litchfield / Vulnerability / Application security / SecurityFocus / Hacker / Security / Computer security / Computing / Cyberwarfare

Visit us at: www.microsoft.com/security security portal SecurityFocus is the leading provider of security intelligence services for business, and a trusted information resource for the security

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2015-05-28 15:51:14
160Security / Network security / Firewall / Trusted Information Systems / Proxy server / Copyright / Distributed firewall / Application firewall / Computer network security / Computing / Computer security

Trusted Information Systems Internet Firewall Toolkit An Overview 1 ©Copyright Trusted Information Systems 1993, All rights reserved

Add to Reading List

Source URL: www.fwtk.org

Language: English - Date: 2015-05-17 11:35:18
UPDATE