Trusted Computing

Results: 881



#Item
761Local area networks / Parallel computing / Ethernet / IWARP / Remote direct memory access / InfiniBand / ISCSI / Fibre Channel over Ethernet / IOPS / Computing / Supercomputers / Computer networks

NFS with iWARP at 40GbE vs. IB-FDR Throughput and IOPS Benchmark Results Executive Summary NFS over RDMA is an exciting development for the trusted, time proven NFS protocol, with the promise of high performance and effi

Add to Reading List

Source URL: www.chelsio.com

Language: English - Date: 2014-03-31 11:52:30
762National Security Agency / Trusted Computer System Evaluation Criteria / Secure communication / United States Department of Defense / Mandatory access control / Defense Technical Information Center / Trusted computing base / Penetration test / XTS-400 / Computer security / Computer network security / Trusted computing

PDF Document

Add to Reading List

Source URL: www.dtic.mil

Language: English - Date: 2011-05-14 21:01:17
763Trusted computing / Hardware security module / Secure cryptoprocessor / Automated teller machine / EMV / Next-Generation Secure Computing Base / Smart card / Trusted Platform Module / Security of automated teller machines / Cryptography / Computer security / Espionage

CHAPTER 18 API Attacks One is happenstance; twice is coincidence; but three times is enemy action. — Goldfinger

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2008-04-27 09:57:39
764Computer law / DADVSI / Digital rights management / Proprietary software / Software patent / Free software / Trusted Computing / Interoperability / Proprietary format / Law / Software licenses / Copyright law

PDF Document

Add to Reading List

Source URL: candidats.fr

Language: English - Date: 2010-02-15 09:30:25
765Cryptographic protocols / Secure multi-party computation / Trusted Computing / Information privacy / Privacy / Internet privacy / Statistical database / Secure two-party computation / Vulnerability / Cryptography / Computer security / Ethics

Report on DIMACS∗ Working Group on Challenges for Cryptographers in Health Data Privacy Date of working group meeting: June 30, 2004 Working Group Organizers: Benny Pinkas, HP Labs Kobbi Nissim, Microsoft Research

Add to Reading List

Source URL: dimacs.rutgers.edu

Language: English - Date: 2004-08-16 11:11:48
766Digital Millennium Copyright Act / Trusted Computing / Ink cartridge / Anti-circumvention / Electronic Arts / OMA DRM / Extended Copy Protection / Copyright law / Law / Digital rights management

FIPR’s Consultation Response on DRM The Foundation for Information Policy Research is an independent body that studies the interaction between information technology and society. Its goal is to identify technical devel

Add to Reading List

Source URL: www.fipr.org

Language: English - Date: 2006-01-18 11:10:21
767Business law / Copyright law / Cryptography / Eben Moglen / Next-Generation Secure Computing Base / Free Software Foundation / Trustworthy computing / Operating system / Microsoft / Computer security / Computing / Trusted computing

Free Software Matters: Untrustworthy Computing Eben Moglen∗ August 11, 2002 “Ideas are not often hard,” the great American judge Oliver Wendell

Add to Reading List

Source URL: emoglen.law.columbia.edu

Language: English - Date: 2003-01-18 20:33:06
768Information / Cryptography / Data / Intellectual property law / Business law / Trusted Computing / Anti-circumvention / Copyright / Intellectual property / Copyright law / Law / Monopoly

Date: Thu, 27 Apr 2006 10:20:07 +0100 To: Dear Sir, Thank you for the opportunity to contribute to your enquiry. The Foundation for Information Policy Research is an independent b

Add to Reading List

Source URL: www.fipr.org

Language: English - Date: 2006-06-12 14:27:12
769Microkernel / Kernel / NICTA / L4 / Gernot Heiser / IGUANA Computing / Computer architecture / L4 microkernel family / Trusted computing base

L4, Wombat, Skyeye and PLEB Ben Leslie   

Add to Reading List

Source URL: benno.id.au

Language: English - Date: 2006-01-23 15:13:54
770Phoenix Technologies / Computing / Economy of the United States / Technology / Aerospace Industries Association / Trusted Computing Group / Trusted Platform Module / CA Technologies

Trusted Computing Platform Alliance: The Mother(board) of all Big Brothers Lucky Green cypherpunks.to

Add to Reading List

Source URL: www.cypherpunks.to

Language: English - Date: 2011-09-20 13:07:03
UPDATE