Trusted Computing

Results: 881



#Item
191

Trusted Computing : limitations actuelles et perspectives SSTIC 2010 – Rennes Frédéric Guihéry, Goulven Guiheux, Frédéric Rémi AMOSSYS

Add to Reading List

Source URL: www.amossys.fr

Language: French - Date: 2012-07-25 04:29:23
    192Cloud infrastructure / Trusted computing / Semiconductor companies / Server hardware / IBM cloud computing / Trusted Execution Technology / Intel / Trusted Computing Group / IBM System x / Cloud computing / Computing / Computer security

    PDF Document

    Add to Reading List

    Source URL: www.intel.de

    Language: English - Date: 2014-03-01 01:08:58
    193Computing / Computer architecture / Control-Alt-Delete / Password / Windows Vista / Disk encryption / Computer security / Trusted computing / Trusted Platform Module

    Application Note Fingerprint Console Fingerprint Console Document revision <0.5> March 2008

    Add to Reading List

    Source URL: download.lenovo.com

    Language: English - Date: 2009-04-13 02:48:25
    194Law / Private law / Board of directors / Business law / Committees / Management / Corporate law / Heights Community Council / Public Interest Declassification Board / Business / Corporate governance / Corporations law

    BYLAWS OF TRUSTED COMPUTING GROUP (An Oregon Nonprofit Corporation) Adopted 26 Feb 2003 As Amended through JulyARTICLE 1: DEFINITIONS

    Add to Reading List

    Source URL: www.trustedcomputinggroup.org

    Language: English - Date: 2012-07-26 13:53:17
    195Computing / E-Science / Framework Programmes for Research and Technological Development / Trusted Computing Group / Trusted Computing / Computer security / Ambient intelligence / National Grid Service / Trust / Ethics / Grid computing / Security

    Microsoft Word - Security theme updated April 2007.doc

    Add to Reading List

    Source URL: www.esi.ac.uk

    Language: English - Date: 2010-05-17 09:10:11
    196Trusted Computing / Maintenance fee / Business / Computer security / Trusted Computing Group / Law

    Trusted Computing Group Membership Agreement MEMBERSHIP CLASSIFICATION: ANNUAL MEMBERSHIP FEE

    Add to Reading List

    Source URL: www.trustedcomputinggroup.org

    Language: English - Date: 2014-11-12 13:55:04
    197Trusted computing / Disk encryption / Cryptography / Trusted Platform Module / Trusted Computing Group / Cryptographic software / Trusted Execution Technology / BitLocker Drive Encryption / BIOS / Computer security / System software / Software

    OSLO: Improving the security of Trusted Computing Bernhard Kauer Technische Universität Dresden Department of Computer ScienceDresden, Germany

    Add to Reading List

    Source URL: os.inf.tu-dresden.de

    Language: English - Date: 2007-05-22 08:46:36
    198Key management / Secure communication / Internet / Electronic commerce / Security / HTTP Secure / Public key certificate / Netscape / Certificate authority / Cryptographic protocols / Public-key cryptography / Computing

    Trusted Paths for Browsers ZISHUANG (EILEEN) YE, SEAN SMITH, and DENISE ANTHONY Dartmouth College Computer security protocols usually terminate in a computer; however, the human-based services which they support usually

    Add to Reading List

    Source URL: www.cs.dartmouth.edu

    Language: English - Date: 2005-08-18 17:24:00
    199Email / Spam filtering / Computer-mediated communication / Email spam / Spam / Anti-spam techniques / EPrivacy Group / Trusted Email Open Standard / Spam Lit / Internet / Spamming / Computing

    Spam By Numbers June, 2003 The following statistics about the unwanted mass email known as spam have been collected by ePrivacy Group from a variety of sources to help educate the public about the extent of this problem.

    Add to Reading List

    Source URL: www.spamhelp.org

    Language: English - Date: 2005-06-25 04:34:30
    200Trusted Computing Group / Trusted Platform Module / Standards / Standards organization / Standardization / Interoperability / Computer security / Trusted computing / Cryptography

    Trusted Computing Standards Overview Mike Boyle IAD Technical Lead for Standards

    Add to Reading List

    Source URL: scap.nist.gov

    Language: English
    UPDATE