Trusted Computing

Results: 881



#Item
581Trusted Platform Module / Trusted Computing Group / Trusted Execution Technology / Next-Generation Secure Computing Base / Counter / Cryptographic hash function / Extensible Storage Engine / Computer security / Trusted computing / Cryptography

Computer Science and Artificial Intelligence Laboratory Technical Report MIT-CSAIL-TR[removed]September 11, 2006

Add to Reading List

Source URL: projects.csail.mit.edu

Language: English - Date: 2006-09-12 07:35:22
582System software / Trusted computing / Trusted Platform Module / Unified Extensible Firmware Interface / Trusted Computing Group / Personal computer hardware / SHA-1 / Computer security / BIOS / Computing

presented by Evolving Hardware-Based Security: Firmware Transition to TPM 2.0 UEFI Summerfest – July 15-19, 2013 Dick Wilkins, Ph.D.

Add to Reading List

Source URL: www.uefi.org

Language: English - Date: 2013-09-24 13:40:23
583Internet2 / Science and technology in the United States / Integrated Digital Enhanced Network / Computer security / National Strategy for Trusted Identities in Cyberspace / Middleware / Privacy / Internet privacy / Computing / Identity management / Ethics / Consortia

Lifestyles  of  the  A-ribute  Rich     and  Privacy  Preserved   IAM  Online  –  June  11,  2014      

Add to Reading List

Source URL: www.incommon.org

Language: English - Date: 2014-06-11 10:20:47
584Salesforce.com / Force.com / Heroku / Cloud computing / Centralized computing / Cloud applications

PIPELINE Innovator Tim Lockyear Makes National Headlines - Merger to Become International Cloud Co. "The combined company is positioned to be the preferred, trusted advisor for companies moving to the cloud. Cloud She

Add to Reading List

Source URL: www.pipelineentrepreneurs.com

Language: English - Date: 2012-08-07 21:01:03
585Computing / Unified Extensible Firmware Interface / Unified EFI Forum / Rootkit / Windows 8 / Booting / TrueCrypt / Disk encryption / Trusted Platform Module / BIOS / System software / Software

UEFI SECURE BOOT IN MODERN COMPUTER SECURITY SOLUTIONS September[removed]Authors:

Add to Reading List

Source URL: www.uefi.org

Language: English - Date: 2013-09-23 19:43:48
586Computer peripherals / Solid-state drive / Hardware-based full disk encryption / Hard disk drive / Trusted Computing Group / Encryption / Disk storage / Hybrid array / Computer hardware / Disk encryption / Computer storage media

SelfEncrypting Drive Market & Technology Report Thomas M. Coughlin Coughlin Associates, Inc.

Add to Reading List

Source URL: www.tomcoughlin.com

Language: English - Date: 2012-09-14 17:16:50
587Booting / Software / Unified Extensible Firmware Interface / EFI System partition / Trusted Computing Group / Trusted Platform Module / Trusted Computing / Portable Executable / Advanced Configuration and Power Interface / System software / BIOS / Computing

TCG EFI Protocol Version 1.20 Final Revision[removed]June, 2006 For TPM Family 1.1 or 1.2 Copyright © 2004, 2005, 2006 Trusted Computing Group, Incorporated.

Add to Reading List

Source URL: www.trustedcomputinggroup.org

Language: English - Date: 2009-04-01 20:52:25
588Digital rights management / Law / Trusted Computing / Records management / Accountability / Copyright law / Business / Archives New Zealand

Microsoft Word - A257233.doc

Add to Reading List

Source URL: archives.govt.nz

Language: English - Date: 2009-09-02 19:50:58
589Cryptographic protocols / Copyright law / Trusted Computing / Public key certificate / Revocation list / Certificate authority / Trusted Platform Module / Public key infrastructure / Trusted third party / Cryptography / Public-key cryptography / Key management

Offline Count-Limited Certificates ∗ Luis F. G. Sarmenta, Marten van Dijk, Jonathan Rhodes, and Srinivas Devadas Computer Science and Artificial Intelligence Laboratory (CSAIL)

Add to Reading List

Source URL: projects.csail.mit.edu

Language: English - Date: 2007-10-30 23:47:52
590Trusted computing / Key management / Cryptographic protocols / Trusted Platform Module / Trusted Computing Group / Certificate authority / HTTP Secure / Public key certificate / Counter / Cryptography / Computer security / Public-key cryptography

Offline Untrusted Storage with Immediate Detection of Forking and Replay Attacks ∗ Marten van Dijk, Jonathan Rhodes, Luis F. G. Sarmenta, and Srinivas Devadas Computer Science and Artificial Intelligence Laboratory (CS

Add to Reading List

Source URL: projects.csail.mit.edu

Language: English - Date: 2007-08-28 16:29:40
UPDATE