Trusted Computing

Results: 881



#Item
171Computer security / Computing / Denial-of-service attack / Internet Relay Chat / Computer worms / Network telescope / Stefan Savage / Firewall / Internet security / Computer network security / Denial-of-service attacks / Cyberwarfare

National Science Foundation Trusted Computing (TC) Solicitation NSFQuantitative Network Security Analysis David Moore, Geoffrey M. Voelker and Stefan Savage

Add to Reading List

Source URL: www.caida.org

Language: English - Date: 2015-05-04 18:48:34
172Ethics / Cryptography / Business law / Copyright law / Trusted Platform Module / Integrity / Data integrity / Kernel / SPARK / Computing / Computer security / Trusted computing

Remote Attestation to Dynamic System Properties: Towards Providing Complete System Integrity Evidence ∗ † Chongkyung Kil§, Emre C. Sezer§, Ahmed M. Azab§, Peng Ning§, Xiaolan Zhang†† †† §

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:05
173Electronic engineering / Cisco Systems / Deep packet inspection / Cisco Career Certifications / VMware / Alcatel-Lucent / Unified communications / CCIE Certification / Computacenter / Videotelephony / Computing / Technology

Facts and Figures – December 2013 Europe’s leading expert in communications services NextiraOne is Europe’s leading expert in communications services and combines a global reach in sales and services with trusted p

Add to Reading List

Source URL: www.nextiraone.eu

Language: English - Date: 2014-12-11 13:44:50
174Embedded Linux / Smartphones / Android / Type system / Apache Ant / Information flow / Java / Software / Computing / Cross-platform software

SPARTA! Static Program Analysis for Reliable Trusted Apps http://types.cs.washington.edu/sparta/ VersionNovemberDo not distribute.

Add to Reading List

Source URL: types.cs.washington.edu

Language: English - Date: 2013-11-19 17:41:03
175F-Secure / Trusted Execution Technology / Computer network security / Computer security / Trusted computing / Antivirus software

PDF Document

Add to Reading List

Source URL: www.securesystems.com.au

Language: English - Date: 2012-10-17 00:57:31
176Information / Secure communication / Computing / Public-key cryptography / Internet standards / Cipher suite / TLS-PSK / Datagram Transport Layer Security / Trusted third party / Cryptographic protocols / Internet protocols / Data

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-03 12:09:04
177Computing / Antivirus software / Malware / ESET NOD32 / ESET / Rootkit / Internet security / Botnet / Spyware / Computer network security / Cyberwarfare / Computer security

2015 EDITION Making the Internet Safer for You to Enjoy Explore the great online, securely protected by ESET’s award-winning detection technology. It’s trusted by over 100 million users worldwide to detect and neut

Add to Reading List

Source URL: static3.esetstatic.com

Language: English - Date: 2015-04-30 07:19:37
178Legal entities / Structure / Nonprofit organization / Corporation / Business / Income tax in the United States / Types of business entity / Business law / Corporations law

ARTICLES OF INCORPORATION OF Trusted Computing Group (an Oregon Nonprofit Corporation) The undersigned individual 18 years of age or older, acting as incorporator under the Oregon Nonprofit Corporation Act, adopts the fo

Add to Reading List

Source URL: www.trustedcomputinggroup.org

Language: English - Date: 2009-04-12 17:38:22
179Digital rights management / Cryptography / GlobalPlatform / Trusted Execution Technology / Tamper resistance / Data security / PlayReady / OMA DRM / Marlin / Computer security / Trusted computing / Copyright law

㏾㜷⌦㬰⌦㬰⌦㬰⌦㬰⌦㬰⌦㬰⌦㬰⌦㬰⌦㬰⌦㬰⌦㬰⌦㬰⌦㬰⌦㬰⌦㬰⌦㬰⌦㬰⌦㬰⌦㬰⌦㬰⌦㬰⌦㬰⌦㬰⌦㬰⌦㬰⌦㬰⌦㬰⌦㬰⌦㬰⌦㬰〰㈰⌦㬰〰㌰⌦㬱〰㔰

Add to Reading List

Source URL: www.insidesecure.com

Language: English
180Routing / Computer network security / Internet protocols / Internet standards / Border Gateway Protocol / Denial-of-service attack / Internet exchange point / HTTP Secure / Internet / Network architecture / Computing

Trusted Networks Initiative Summary VersionTrusted Networks Initiative The Trusted Networks Initiative aims at a global

Add to Reading List

Source URL: www.cybersecurityweek.nl

Language: English - Date: 2015-04-02 05:32:45
UPDATE