Trusted Execution Technology

Results: 107



#Item
21Trusted Computing and Free Software RMLL 2009 – Nantes Frédéric Guihéry AMOSSYS  July 9, 2009

Trusted Computing and Free Software RMLL 2009 – Nantes Frédéric Guihéry AMOSSYS July 9, 2009

Add to Reading List

Source URL: www.amossys.fr

Language: English - Date: 2012-07-25 04:35:25
22

PDF Document

Add to Reading List

Source URL: cansecwest.com

Language: English - Date: 2015-03-27 04:18:18
23

PDF Document

Add to Reading List

Source URL: www.intel.de

Language: English - Date: 2014-04-03 20:38:13
24bloc marque driving trust cmjn

bloc marque driving trust cmjn

Add to Reading List

Source URL: www.insidesecure.com

Language: English
25

PDF Document

Add to Reading List

Source URL: www.intel.de

Language: English - Date: 2014-03-01 01:08:58
26OSLO: Improving the security of Trusted Computing Bernhard Kauer Technische Universität Dresden Department of Computer ScienceDresden, Germany

OSLO: Improving the security of Trusted Computing Bernhard Kauer Technische Universität Dresden Department of Computer ScienceDresden, Germany

Add to Reading List

Source URL: os.inf.tu-dresden.de

Language: English - Date: 2007-05-22 08:46:36
27Into the Unknown: Assessing your BIOS Vulnerabilities Xeno Kovah Lead InfoSec Engineer MITRE Approved for Public Release; Distribution Unlimited. Case Number

Into the Unknown: Assessing your BIOS Vulnerabilities Xeno Kovah Lead InfoSec Engineer MITRE Approved for Public Release; Distribution Unlimited. Case Number

Add to Reading List

Source URL: dl.mandiant.com

Language: English - Date: 2015-05-11 08:19:08
28Problems with the Static Root of Trust for Measurement John Butterworth Corey Kallenberg Xeno Kovah Amy Herzog

Problems with the Static Root of Trust for Measurement John Butterworth Corey Kallenberg Xeno Kovah Amy Herzog

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2013-07-31 03:56:11
29Trusted Compute Pools Feature in oVirt Oct 22, 2013 Gang Wei,  Haitao Shan,

Trusted Compute Pools Feature in oVirt Oct 22, 2013 Gang Wei, Haitao Shan,

Add to Reading List

Source URL: www.linux-kvm.org

Language: English - Date: 2013-11-03 05:32:36
30TRUSTED TAMPERPROOF TIME ON MOBILE DEVICES  Trusted Tamperproof Time on Mobile Devices Using TPM 2.0 Services with Remote Attestation August 2, 2013

TRUSTED TAMPERPROOF TIME ON MOBILE DEVICES Trusted Tamperproof Time on Mobile Devices Using TPM 2.0 Services with Remote Attestation August 2, 2013

Add to Reading List

Source URL: www.jwsecure.com

Language: English - Date: 2014-12-16 20:21:45