Trusted Computing

Results: 881



#Item
41Cryptography / Computer security / Microsoft Windows / Cryptographic software / Trusted computing / Disk encryption / Windows Vista / Trusted Platform Module / BitLocker / Unified Extensible Firmware Interface / Booting / Trusted Computing Group

Advanced  x86:   BIOS  and  System  Management  Mode  Internals   Trusted  Compu-ng  Technologies   Xeno  Kovah  &&  Corey  Kallenberg   LegbaCore,  LLC  

Add to Reading List

Source URL: opensecuritytraining.info

Language: English - Date: 2015-10-14 22:12:02
42Computer architecture / Computer security / System software / Trusted computing / Operating system kernels / Boot loaders / Cryptographic software / Trusted Platform Module / Trusted Execution Technology / Trusted Computing Group / Loadable kernel module / Loader

Analysis of a Measured Launch

Add to Reading List

Source URL: evenmere.org

Language: English - Date: 2008-06-23 13:59:25
43

Ninth IEEE International Symposium on Parallel and Distributed Processing with Applications Workshops Trusted Computing Dynamic Attestation by Using Static Analysis based Behavior Model Tang‡ , Yue Yu∗ , Tong Li∗

Add to Reading List

Source URL: yuyue.github.io

Language: English - Date: 2016-03-22 01:11:56
    44Computer security / Computing / Trusted computing / Cryptography / Windows Vista / Trusted Computing Group / Next-Generation Secure Computing Base / Grid computing / Proxy server / Rootkit / Virtualization / Hardware virtualization

    information security technical report–138 available at www.sciencedirect.com www.compseconline.com/publications/prodinf.htm

    Add to Reading List

    Source URL: ipads.se.sjtu.edu.cn

    Language: English - Date: 2012-01-05 23:25:04
    45

    Trusted Computing on Athena Benjamin Tidor, Eric Mannes, Gaurav Singh Motivation In 2005, a number of Athena cluster machines were modified by a student to  steal the passwords of anyone who logged i

    Add to Reading List

    Source URL: css.csail.mit.edu

    Language: English - Date: 2016-01-29 11:50:00
      46

      2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications A Trusted Remote Attestation Model based on Trusted Computing Yue Yu, Huaimin Wang, Bo Liu, Gang Yin National Labora

      Add to Reading List

      Source URL: yuyue.github.io

      Language: English - Date: 2016-03-22 01:11:56
        47Digital rights management / Copyright law / Cryptography / Computer security / Cryptography law / Analog hole / Trusted Computing / Secure Digital Music Initiative / Digital watermarking / OMA DRM / Direct Rendering Manager

        WORKING DRAFT Privacy-DRM: Data Protection by Copy Protection ? Rainer Böhme1 and Andreas Pfitzmann ✝2, Technische Universität Dresden, Germany Abstract

        Add to Reading List

        Source URL: informationsecurity.uibk.ac.at

        Language: English - Date: 2016-04-12 07:21:29
        48

        Exploring the Integration of Memory Management and Trusted Computing Dartmouth Computer Science Technical Report TR2007-594 A Thesis Submitted to the Faculty in partial fulfillment of the requirements for the

        Add to Reading List

        Source URL: www.ists.dartmouth.edu

        Language: English - Date: 2008-09-11 13:40:21
          49

          Peer-to-Peer Access Control Architecture Using Trusted Computing Technology Ravi Sandhu and Xinwen Zhang George Mason University {sandhu, xzhang6}@gmu.edu

          Add to Reading List

          Source URL: www.profsandhu.com

          Language: English - Date: 2008-02-07 14:26:06
            50

            Automatic Search for Key-Bridging Technique: Applications to LBlock and TWINE Li Lin, Wenling Wu, and Yafei Zheng Trusted Computing and Information Assurance Laboratory,

            Add to Reading List

            Source URL: fse.rub.de

            Language: English - Date: 2016-03-22 07:28:11
              UPDATE