Trusted Computing

Results: 881



#Item
211Disk encryption / Trusted Platform Module / Trusted Computing Group / Computer network security / Cryptographic software / BitLocker Drive Encryption / Trusted Network Connect / Next-Generation Secure Computing Base / Direct Anonymous Attestation / Computer security / Trusted computing / Cryptography

Trusted Platform Module (TPM)

Add to Reading List

Source URL: www.trustedcomputinggroup.org

Language: English - Date: 2009-03-28 00:28:27
212Mobile telecommunications / Software / Ubiquitous computing / Applet / Component-based software engineering / Trusted service manager / Smart card / Android / Value-added service / Technology / Computing / ISO standards

GSM Association Official Document NFC.19 - Value Added Services Applet Design Proposal Non-confidential Value Added Services Applet Design Proposal

Add to Reading List

Source URL: www.gsma.com

Language: English - Date: 2015-03-11 12:57:55
213BIOS / Trusted computing / Trusted Platform Module / Trusted Execution Technology / Disk encryption / Trusted Computing Group / BitLocker Drive Encryption / Unified Extensible Firmware Interface / System Management Mode / Computer security / System software / Computing

Problems with the Static Root of Trust for Measurement John Butterworth Corey Kallenberg Xeno Kovah Amy Herzog

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2013-07-31 03:56:11
214Computing / Cloud computing / Intel vPro / Trusted computing / Trusted Execution Technology / Trusted Platform Module

Trusted Compute Pools Feature in oVirt Oct 22, 2013 Gang Wei, Haitao Shan,

Add to Reading List

Source URL: www.linux-kvm.org

Language: English - Date: 2013-11-03 05:32:36
215Web development / Singapore Post / Digital mailroom / Online shopping / Logistics / Business / Computing / Technology / Electronic commerce / Information technology management / Marketing

Investor Presentation March 2015 Contents ▪ SingPost’s Transformation ▪ Investing in Trusted Communications

Add to Reading List

Source URL: www.singpost.com.sg

Language: English - Date: 2015-03-03 22:04:25
216Computing / Internet / Google / Human–computer interaction / World Wide Web

• The definitive home for business intelligence on the web, AB.com provides the regional business community with trusted news, analysis and opinion, delivering breaking stories around the

Add to Reading List

Source URL: www.arabianbusiness.com

Language: English - Date: 2014-04-09 02:40:15
217Computer network security / Trusted computing / Computer security

CNAC: Filtered Endpoint Event Detail Detailed activity for filtered endpoints Date Time

Add to Reading List

Source URL: www.extraxi.com

Language: English - Date: 2005-04-15 12:14:40
218Phishing / Password manager / Session hijacking / Firesheep / Transaction authentication number / Password / Internet privacy / HTTP cookie / Firefox / Software / Computing / Malware

Using the SIM as a Trusted Element to Secure the Mobile Web Henry Irish, Trinity Hall Computer Science Tripos Part III 13 June 2013

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2013-10-23 12:24:28
219Electric power transmission systems / Electromagnetism / Emerging technologies / Smart grid / Smart meter / Demand response / Electrical grid / Internet privacy / Privacy / Electric power / Energy / Electric power distribution

Privacy-Enhanced Bi-Directional Communication in the Smart Grid using Trusted Computing Andrew Paverd, Andrew Martin, Ian Brown University of Oxford

Add to Reading List

Source URL: www.cs.ox.ac.uk

Language: English - Date: 2015-03-18 10:54:42
220Computer network security / IEEE 802.11 / Computing / Technology / Wireless security / IEEE 802.1X / Wireless access point / Inter-Access Point Protocol / CCMP / Cryptographic protocols / Wireless networking / Cryptography

There’s No Such Thing as A Trusted Network Wireless Security in the Enterprise Randy Chou

Add to Reading List

Source URL: www.wca.org

Language: English - Date: 2007-03-15 02:38:10
UPDATE