Trusted Computing

Results: 881



#Item
41Advanced	
  x86:	
    BIOS	
  and	
  System	
  Management	
  Mode	
  Internals	
   Trusted	
  Compu-ng	
  Technologies	
   Xeno	
  Kovah	
  &&	
  Corey	
  Kallenberg	
   LegbaCore,	
  LLC	
  

Advanced  x86:   BIOS  and  System  Management  Mode  Internals   Trusted  Compu-ng  Technologies   Xeno  Kovah  &&  Corey  Kallenberg   LegbaCore,  LLC  

Add to Reading List

Source URL: opensecuritytraining.info

Language: English - Date: 2015-10-14 22:12:02
42Analysis of a Measured Launch

Analysis of a Measured Launch

Add to Reading List

Source URL: evenmere.org

Language: English - Date: 2008-06-23 13:59:25
43Ninth IEEE International Symposium on Parallel and Distributed Processing with Applications Workshops  Trusted Computing Dynamic Attestation by Using Static Analysis based Behavior Model Tang‡ , Yue Yu∗ , Tong Li∗

Ninth IEEE International Symposium on Parallel and Distributed Processing with Applications Workshops Trusted Computing Dynamic Attestation by Using Static Analysis based Behavior Model Tang‡ , Yue Yu∗ , Tong Li∗

Add to Reading List

Source URL: yuyue.github.io

Language: English - Date: 2016-03-22 01:11:56
    44information security technical report–138  available at www.sciencedirect.com www.compseconline.com/publications/prodinf.htm

    information security technical report–138 available at www.sciencedirect.com www.compseconline.com/publications/prodinf.htm

    Add to Reading List

    Source URL: ipads.se.sjtu.edu.cn

    Language: English - Date: 2012-01-05 23:25:04
    45Trusted Computing on Athena Benjamin Tidor, Eric Mannes, Gaurav Singh Motivation In 2005, a number of Athena cluster machines were modified by a student to  steal the passwords of anyone who logged i

    Trusted Computing on Athena Benjamin Tidor, Eric Mannes, Gaurav Singh Motivation In 2005, a number of Athena cluster machines were modified by a student to  steal the passwords of anyone who logged i

    Add to Reading List

    Source URL: css.csail.mit.edu

    Language: English - Date: 2016-01-29 11:50:00
      462013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications  A Trusted Remote Attestation Model based on Trusted Computing Yue Yu, Huaimin Wang, Bo Liu, Gang Yin National Labora

      2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications A Trusted Remote Attestation Model based on Trusted Computing Yue Yu, Huaimin Wang, Bo Liu, Gang Yin National Labora

      Add to Reading List

      Source URL: yuyue.github.io

      Language: English - Date: 2016-03-22 01:11:56
        47WORKING DRAFT  Privacy-DRM: Data Protection by Copy Protection ? Rainer Böhme1 and Andreas Pfitzmann ✝2, Technische Universität Dresden, Germany  Abstract

        WORKING DRAFT Privacy-DRM: Data Protection by Copy Protection ? Rainer Böhme1 and Andreas Pfitzmann ✝2, Technische Universität Dresden, Germany Abstract

        Add to Reading List

        Source URL: informationsecurity.uibk.ac.at

        Language: English - Date: 2016-04-12 07:21:29
        48Exploring the Integration of Memory Management and Trusted Computing Dartmouth Computer Science Technical Report TR2007-594 A Thesis Submitted to the Faculty in partial fulfillment of the requirements for the

        Exploring the Integration of Memory Management and Trusted Computing Dartmouth Computer Science Technical Report TR2007-594 A Thesis Submitted to the Faculty in partial fulfillment of the requirements for the

        Add to Reading List

        Source URL: www.ists.dartmouth.edu

        Language: English - Date: 2008-09-11 13:40:21
          49Peer-to-Peer Access Control Architecture Using Trusted Computing Technology Ravi Sandhu and Xinwen Zhang George Mason University {sandhu, xzhang6}@gmu.edu

          Peer-to-Peer Access Control Architecture Using Trusted Computing Technology Ravi Sandhu and Xinwen Zhang George Mason University {sandhu, xzhang6}@gmu.edu

          Add to Reading List

          Source URL: www.profsandhu.com

          Language: English - Date: 2008-02-07 14:26:06
            50Automatic Search for Key-Bridging Technique: Applications to LBlock and TWINE Li Lin, Wenling Wu, and Yafei Zheng Trusted Computing and Information Assurance Laboratory,

            Automatic Search for Key-Bridging Technique: Applications to LBlock and TWINE Li Lin, Wenling Wu, and Yafei Zheng Trusted Computing and Information Assurance Laboratory,

            Add to Reading List

            Source URL: fse.rub.de

            Language: English - Date: 2016-03-22 07:28:11