Trusted Computing

Results: 881



#Item
601Computer security / Computing / MAAWG / Internet privacy / Domain Name System Security Extensions / Internet / Computer network security / National Strategy for Trusted Identities in Cyberspace

From: Messaging Anti-Abuse Working Group (MAAWG) Date: July 19, 2010 Subject: Comments on the National Strategy for Trusted Identities in Cyberspace Thank you for the opportunity to review and comment on the National Str

Add to Reading List

Source URL: www.maawg.org

Language: English - Date: 2010-11-23 17:52:45
602Bayes estimator / Loss function / Maximum likelihood / Prior probability / Statistics / Estimation theory / Statistical theory

Template Attacks Based On Priori Knowledge Guangjun Fan1 , Yongbin Zhou2 , Dengguo Feng1 1 Trusted Computing and Information Assurance Laboratory, Institute of Software, Chinese Academy of Sciences

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-09-01 22:05:38
603AT&T / Economy of the United States / Computing / Ethernet / Network switch / Blaylock

Rockwood School District switches to a trusted provider offering a high-performing Ethernet WAN Years of proven experience made AT&T the clear choice for the Missouri school system W

Add to Reading List

Source URL: www.corp.att.com

Language: English - Date: 2013-11-12 10:45:22
604Finance / EMV / Smart card / Credit card / Debit card / Payment card / Interac / Direct Anonymous Attestation / Trusted Computing / Payment systems / Business / Money

e-EMV: Emulating EMV for Internet payments using Trusted Computing technology Shane Balfe and Kenneth G. Paterson, Information Security Group, Royal Holloway, University of London, Egham, Surrey, TW20 0EX, United Kingdom

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2008-02-29 12:44:11
605File sharing networks / File sharing / Distributed data storage / Peer-to-peer computing / Distributed algorithms / Peer-to-peer / ANts P2P / Social peer-to-peer processes / HTTP / Computing / Concurrent computing / Distributed computing

Securing Peer-to-Peer Networks Using Trusted Computing Shane Balfe, Amit D. Lakhani and Kenneth G. Paterson, Information Security Group, Royal Holloway, University of London, Egham, Surrey, TW20 0EX, United Kingdom.

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2005-01-31 10:46:54
606Trusted computing / Virtual machines / Windows Server / Trusted Execution Technology / x86 architecture / Trusted Platform Module / Virtual appliance / Hypervisor / Cloud computing / System software / Software / Computing

LNCS[removed]Introducing the Trusted Virtual Environment Module: A New Mechanism for Rooting Trust in Cloud Computing

Add to Reading List

Source URL: www.cisa.umbc.edu

Language: English - Date: 2012-01-13 12:57:13
607Software / Computing / Human–computer interaction / Checkbox / Public Broadcasting Service / Form

WHAT IF LIMITED BUDGETS DIDN’T LIMIT LEARNING? Introducing AZ PBS LearningMedia, a vast digital content service from the most trusted educational media brand: PBS AZ PBS LearningMedia provides teachers with free acces

Add to Reading List

Source URL: www.asset.asu.edu

Language: English - Date: 2014-02-25 17:20:43
608Trusted computing / Cryptography / File sharing networks / Internet privacy / Direct Anonymous Attestation / Peer-to-peer computing / Trusted Platform Module / Peer-to-peer / Social peer-to-peer processes / Computer security / Computing / Concurrent computing

Trusted Computing: Providing Security for Peer-to-Peer Networks Shane Balfe, Amit D. Lakhani and Kenneth G. Paterson, Information Security Group, Royal Holloway, University of London, United Kingdom. {S.Balfe,Amit.Lakhan

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2005-06-23 08:33:02
609Monolithic kernels / Kernel / Ring / Mandatory access control / Architecture of Windows NT / Operating system / Mach / Trusted computing base / Linux kernel / Computer architecture / System software / Software

Hardware Enforcement of Application Security Policies Using Tagged Memory Nickolai Zeldovich∗ , Hari Kannan† , Michael Dalton† , and Christos Kozyrakis† ∗ † MIT

Add to Reading List

Source URL: www.scs.stanford.edu

Language: English - Date: 2008-10-09 13:10:59
610Trusted Platform Module / Payment systems / EMV / Peer-to-peer / Chip and PIN / Computer security / Trusted computing / Cryptography

Secure Payment Architectures and Other Applications of Trusted Computing Shane Balfe Technical Report RHUL–MA–2009–10

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2009-02-20 05:26:26
UPDATE