Trusted Computing

Results: 881



#Item
751Gemalto / Digital security / Smart cards / ISO standards / Ubiquitous computing

TRUSTED LOGIC Corporate Brochure ABOUT trusteD

Add to Reading List

Source URL: www.trusted-logic.com

Language: English - Date: 2013-09-12 09:00:02
752Disk encryption / Cryptographic software / Windows Vista / BitLocker Drive Encryption / Windows Server / Trusted Platform Module / Trusted Computing Group / NTFS / USB flash drive / Microsoft Windows / Cryptography / Computer security

Bitlocker and Windows Vista This is an INCOMPLETE draft version. Visit www.nvlabs.in for updates. Nitin Kumar

Add to Reading List

Source URL: www.nvlabs.in

Language: English - Date: 2013-11-13 03:35:04
753Advertising / Communication design / Graphic design / Yahoo! / Hewlett-Packard / Computing / Technology / Computer hardware

Fact Card Your trusted resource for sustainable and green business news Southeast Green is a website and business

Add to Reading List

Source URL: www.southeastgreen.com

Language: English - Date: 2013-01-21 00:36:46
754Business law / Copyright law / Cryptography / Eben Moglen / Next-Generation Secure Computing Base / Free Software Foundation / Trustworthy computing / Operating system / Microsoft / Computer security / Computing / Trusted computing

Free Software Matters: Untrustworthy Computing Eben Moglen∗ August 11, 2002 “Ideas are not often hard,” the great American judge Oliver Wendell

Add to Reading List

Source URL: moglen.law.columbia.edu

Language: English - Date: 2003-01-18 20:33:06
755Sun Microsystems / Computing platforms / Java / Computing / Cross-platform software / Java platform

Trusted Status It’s in everyone’s interest to maintain the quality of Java ME applications, whilst keeping the cost to the developer as low as possible. For this reason we’ve introduced a new, Trusted Status. We w

Add to Reading List

Source URL: javaverified.com

Language: English - Date: 2013-04-09 08:55:31
756Cryptography standards / Cryptographic protocols / XML / XML Signature / Abstract Syntax Notation One / Time stamp protocol / Digital signature / XAdES / Trusted timestamping / Computing / Cryptography / Information

XML Security Time Stamping Protocol Axelle Apvrille Vincent Girier Storage Technology European Operations 1 Rd Point G´en´eral Eisenhower[removed]Toulouse, France Axelle Apvrille,Vincent Girier  @storagetek.com

Add to Reading List

Source URL: xml.coverpages.org

Language: English - Date: 2002-12-13 12:02:37
757National Security Agency / Trusted computing / Trusted computing base / Trusted Computer System Evaluation Criteria / Operating system / Mandatory access control / Kernel / Ring / Device driver / Computer security / Computer architecture / Computing

The Army Secure Operating System Neil A. Waldhart TRW Systems Integration Group

Add to Reading List

Source URL: www.cs.washington.edu

Language: English - Date: 2007-04-07 00:40:38
758Direct Anonymous Attestation / Internet privacy / Trusted computing / Trusted Platform Module / Cloud computing / Cryptography / Computer security / Computing

Direct Anonymous Attestation: Enhancing Cloud Service User Privacy Ulrich Greveler, Benjamin Justus, and Dennis Loehr Computer Security Lab M¨ unster University of Applied Sciences

Add to Reading List

Source URL: 1lab.de

Language: English - Date: 2011-09-26 03:53:20
759Nixle / Text messaging / Internet / Computing / Email / Tab

HOW TO GET INFORMATION ON STATE GOVERNMENT DELAYS AND CLOSURES ON YOUR CELL PHONE AND EMAIL Get trusted alerts from various local agencies, including weather, to your email and/or cell phone by signing up FREE! 1. HOW T

Add to Reading List

Source URL: www.spo.state.nm.us

Language: English - Date: 2013-11-12 18:43:49
UPDATE