Trusted Computing

Results: 881



#Item
671Graphing calculators / Computing / Programmable calculators / Computer algebra systems / Carnegie Mellon University / Computer emergency response team / National research and education network

S-CURE The Trusted Introducer Status Review 29 May 2003, Warsaw, Poland Klaus-Peter Kossakowski

Add to Reading List

Source URL: www.terena.org

Language: English - Date: 2003-06-02 07:53:32
672National research and education network / Ti / Programmable calculators / Computing / Computer algebra systems / Technology / Carnegie Mellon University / Computer emergency response team / Graphing calculators

S-CURE The Trusted Introducer Status Message 27 September 2002, Syros, Greece Don Stikvoort

Add to Reading List

Source URL: www.terena.org

Language: English - Date: 2003-03-13 10:31:41
673Request Tracker / TI / Computing / Carnegie Mellon University / Computer emergency response team / National research and education network

S-CURE The Trusted Introducer Status Message 24 January 2003, Zagreb, Croatia Don Stikvoort

Add to Reading List

Source URL: www.terena.org

Language: English - Date: 2003-03-28 06:10:46
674Centralized computing / Cloud computing / Computing

EUROPEAN TRUSTED CLOUD SPACE C.Bartolo Jan 2014, v0b (Users perspective) (to allow Cloud adoption)

Add to Reading List

Source URL: www.eurocio.org

Language: English - Date: 2014-05-16 04:21:58
675Cloud infrastructure / Cloud communications / Cloud collaboration / Cloud computing / Centralized computing / Computing

Establishing a Trusted Cloud Europe A policy vision document by the Steering Board of the European Cloud Partnership

Add to Reading List

Source URL: ec.europa.eu

Language: English - Date: 2014-03-21 12:14:45
676Central processing unit / Physical Unclonable Function / Randomness / Trusted computing / Parallel computing / Ring / Memory management unit / Kernel / Next-Generation Secure Computing Base / Computing / Computer architecture / Computer hardware

Design and Implementation of the AEGIS Single-Chip Secure Processor Using Physical Random Functions G. Edward Suh, Charles W. O’Donnell, Ishan Sachdev, and Srinivas Devadas Computer Science and Artificial Intelligence

Add to Reading List

Source URL: csg.csail.mit.edu

Language: English - Date: 2005-04-24 19:19:10
677Cloud infrastructure / Cloud communications / Cloud collaboration / Cloud computing / Centralized computing / Computing

Establishing a Trusted Cloud Europe A policy vision document by the Steering Board of the European Cloud Partnership

Add to Reading List

Source URL: ec.europa.eu

Language: English - Date: 2014-03-21 12:13:00
678Wireless / ISO standards / Electronic commerce / Ubiquitous computing / Near field communication / Trusted service manager / Mobile payment / Smart card / Mobile phone / Technology / Mobile telecommunications / Mobile technology

A Series of Whitepapers on NFC security - Part 1 A Security Analysis of NFC Implementation in the Mobile Proximity Payments Environment Security Task Force (STF)

Add to Reading List

Source URL: www.mobeyforum.org

Language: English - Date: 2013-06-11 04:54:17
679Cloud infrastructure / Cloud communications / Cloud collaboration / Cloud computing / Centralized computing / Computing

Establishing a Trusted Cloud Europe A policy vision document by the Steering Board of the European Cloud Partnership

Add to Reading List

Source URL: ec.europa.eu

Language: English - Date: 2014-03-21 12:14:27
680Cyberwarfare / Trusted Network Connect / IEEE 802.1X / Network Access Control / RADIUS / Extensible Authentication Protocol / Juniper Networks / Trusted Computing Group / Wireless access point / Computer network security / Computer security / Computing

White Paper The Importance of Standards to Network Access Control Juniper Networks, Inc.

Add to Reading List

Source URL: www.opus1.com

Language: English - Date: 2008-04-28 05:03:54
UPDATE