Trusted Computing

Results: 881



#Item
61

Trusted Computing Exemplar (TCX) Project Objective Provide a working example showing how trusted computing systems and components can be constructed to meet high assurance evaluation criteria. Reference implementation co

Add to Reading List

Source URL: www.cisr.us

Language: English - Date: 2007-11-15 12:21:22
    62Embedded operating systems / Smart cards / GlobalPlatform / Computing / Standard Performance Evaluation Corporation / Pricing / Software / Evaluation / Trusted execution environment

    Microsoft Word - SystemSpecCompliance.doc

    Add to Reading List

    Source URL: www.globalplatform.org

    Language: English - Date: 2011-02-25 21:08:34
    63Software / Computing / Computer access control / Computer security / Hacking / Social engineering / User interface techniques / Security / Cross-site request forgery / Cross-site scripting / Phishing / Clickjacking

    A Trusted UI for the Mobile Web Bastian Braun1 , Johannes Koestler1 , Joachim Posegga1 , and Martin Johns2 1 Institute of IT Security and Security Law (ISL), University of Passau, Germany 2

    Add to Reading List

    Source URL: dl.dropboxusercontent.com

    Language: English
    64

    Appeared in the 23rd Annual IFIP WG 11.3 Working Conference on Data and Application Security, 2009, pp. 252–267. Improving Cut-and-Choose in Verifiable Encryption and Fair Exchange Protocols using Trusted Computing Te

    Add to Reading List

    Source URL: www.uncg.edu

    Language: English - Date: 2009-10-01 15:00:03
      65Computing / Software / Java platform / Cross-platform software / Java / Java applet / Applet / Java Card / Mobile app / Trusted execution environment / Provisioning / Android

      Market-driven Code Provisioning to Mobile Secure Hardware Alexandra Dmitrienko2 , Stephan Heuser1 , Thien Duc Nguyen1 , Marcos da Silva Ramos2 , Andre Rein2 , and Ahmad-Reza Sadeghi1 1

      Add to Reading List

      Source URL: www.trust.informatik.tu-darmstadt.de

      Language: English - Date: 2015-02-25 06:38:39
      66Computer security / Computing / Cryptography / Computer network security / Trusted computing / IPsec / Cryptographic software / Cryptographic protocols / StrongSwan / Trusted Network Connect / IF-MAP / Internet Key Exchange

      The Linux Integrity Measurement Architecture and TPM-Based Network Endpoint Assessment Andreas Steffen ITA Institute for Internet Technologies and Applications HSR University of Applied Sciences Rapperswil CH-8640 Rapper

      Add to Reading List

      Source URL: www.strongswan.org

      Language: English - Date: 2012-08-29 15:32:53
      67

      To appear in the 2010 International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS). Timing-Accurate TPM Simulation for What-If Explorations in Trusted Computing Vandana Gunupudi

      Add to Reading List

      Source URL: nsl.cse.unt.edu

      Language: English - Date: 2012-01-08 09:38:06
        68

        Definitions and understanding of —information security --cryptology or cryptography --trusted computing --privacy -Xuejia Lai

        Add to Reading List

        Source URL: cis.sjtu.edu.cn

        Language: English - Date: 2012-12-14 01:12:47
          69

          A finer grained Network Access Control using TrustView Security Architecture and Trusted Network Connect Architecture Chaitanya Vinay Hazarey CSCI 599tc Trusted Computing, Spring 2007

          Add to Reading List

          Source URL: hazarey.s3.amazonaws.com

          Language: English - Date: 2012-04-12 21:35:06
            70Computer security / Business / Risk analysis / Data security / Computing / Supply chain management / Supply chain risk management / National Institute of Standards and Technology / Security controls / Open Trusted Technology Provider Standard

            ITL Bulletin, Increasing Visibility and Control of Your ICT Supply Chains (June 2015)

            Add to Reading List

            Source URL: csrc.nist.gov

            Language: English - Date: 2015-06-15 11:08:27
            UPDATE