Trusted Computing

Results: 881



#Item
641Public-key cryptography / Diffie–Hellman key exchange / Communications protocol / Key-agreement protocol / Oracle machine / Random oracle / Cryptography / Cryptographic protocols / Advantage

An extended abstract of this work appeared in: The 4th International Conference on Autonomic and Trusted Computing (ATC ’07) (July 11–[removed], Hong-Kong, China) B. Xiao, L. T. Yang, J. Ma, C. Muller-Schloer and Y. Hu

Add to Reading List

Source URL: www.ssi.gouv.fr

Language: English - Date: 2012-11-06 05:29:19
642Tablet computer / Surveillance / High Assurance Internet Protocol Encryptor / National Security Agency / National security / Computing / Classes of computers / Personal computing

Trusted Tablet Battlefied Rugged Trusted Host Computer NSA Type 1 Certified, SECRET data in storage, and SECRET data in transit

Add to Reading List

Source URL: www.sncorp.com

Language: English - Date: 2014-08-11 15:46:43
643National security / Trusted computing base / Trusted Computing / Internet privacy / Public safety / Multilevel security / Security / Computer security / Crime prevention

Do You Know Where Your Data Are? Secure Data Capsules for Deployable Data Protection Petros Maniatis† , Devdatta Akhawe∗ , Kevin Fall† , Elaine Shi∗‡ , Stephen McCamant∗ , Dawn Song∗ ‡ PARC, ∗ UC Berkel

Add to Reading List

Source URL: devd.me

Language: English - Date: 2015-03-02 02:58:50
644Spyware / Computer network security / Computer security / Malware / Cryptography / Trusted computing base / Threat / Firmware / Backdoor / Cyberwarfare / Espionage / Security

Trojan hardware – some strategies and defenses Markus Kuhn Computer Laboratory http://www.cl.cam.ac.uk/~mgk25/

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2008-06-17 17:30:34
645Technology / Mobile device / Handheld game console / Computing / Mobile computers / Classes of computers / Information appliances

Trusted Handheld Battlefied Rugged Trusted Host Computer NSA Type 1 Certified, SECRET data in storage, and SECRET data in transit

Add to Reading List

Source URL: www.sncorp.com

Language: English - Date: 2014-08-11 15:46:41
646Computer network security / APL programming language family / Trusted computing / Cryptography / Trustworthy computing / APL / Malware / Trusted Platform Module / Computer virus / Computing / Computer security / Security

Trustworthy Computing: Making Cyberspace Safe—Guest Editor’s Introduction

Add to Reading List

Source URL: www.jhuapl.edu

Language: English - Date: 2013-09-27 10:05:08
647Computer law / Gramm–Leach–Bliley Act / Privacy law / Privacy policy / Gramm / Government / Computing / Managed Trusted Internet Protocol Service / Community Reinvestment Act / United States federal banking legislation / Law / 106th United States Congress

Document: Emergency Rule Source: November 1, 2000, Indiana Register, Volume 24, Number 2 Disclaimer: These documents were created from the files used to produce the official (printed) Indiana Register, however, these doc

Add to Reading List

Source URL: www.in.gov

Language: English - Date: 2007-03-15 08:00:12
648Security / United States Department of Homeland Security / Computer crimes / Computing / International Multilateral Partnership Against Cyber Threats / National Cybersecurity Center / Federal Information Security Management Act / National Strategy for Trusted Identities in Cyberspace / National Cyber Security Division / Cyberwarfare / Computer network security / Computer security

Cybersecurity Executive Order Impact on Industry and Government June 3, 2014 17th Annual New York State

Add to Reading List

Source URL: www.dhses.ny.gov

Language: English - Date: 2014-06-09 08:05:28
649Museology / Computing / Preservation / Conservation-restoration / Data quality / Digital preservation / Open Archival Information System / XML / Neelie Kroes / Digital libraries / Archival science / Library science

APA opening remarks David Giaretta APA APA/C-DAC International Conference on Digital Preservation and the Development of Trusted Digital Repositories 5-6 February 2014

Add to Reading List

Source URL: www.ndpp.in

Language: English - Date: 2014-02-21 03:01:11
650National Strategy for Trusted Identities in Cyberspace / FIPS 201 / Computer security / Computing / Abstraction / Identity management / Identity assurance / Interoperability

PSCR 2010 Winter Conference Access, Cyber Threat, and Identity Management Mark Adams Northrop Grumman Information Systems

Add to Reading List

Source URL: www.pscr.gov

Language: English - Date: 2010-12-02 09:24:30
UPDATE