Trusted Execution Technology

Results: 107



#Item
21Next-Generation Secure Computing Base / Trusted Execution Technology / Trusted Network Connect / Trusted Computing Group / Computer security / Trusted computing / Trusted Platform Module

Trusted Computing and Free Software RMLL 2009 – Nantes Frédéric Guihéry AMOSSYS July 9, 2009

Add to Reading List

Source URL: www.amossys.fr

Language: English - Date: 2012-07-25 04:35:25
22Computer security / Malware / Rootkit / Ring / Virtual machine / Hypervisor / Unified Extensible Firmware Interface / Operating system / Trusted Execution Technology / System software / Computing / Software

PDF Document

Add to Reading List

Source URL: cansecwest.com

Language: English - Date: 2015-03-27 04:18:18
23Computer architecture / Computer security / Companies listed on the New York Stock Exchange / Cloud computing / Intel / Trusted Execution Technology / AES instruction set / IBM cloud computing / McAfee VirusScan / Computing / Centralized computing / McAfee

PDF Document

Add to Reading List

Source URL: www.intel.de

Language: English - Date: 2014-04-03 20:38:13
24Trusted computing / Password / Public-key cryptography / Trusted Execution Technology / Information security / Access control / Disk encryption / Two-factor authentication / Security / Cryptography / Computer security

bloc marque driving trust cmjn

Add to Reading List

Source URL: www.insidesecure.com

Language: English
25Cloud infrastructure / Trusted computing / Semiconductor companies / Server hardware / IBM cloud computing / Trusted Execution Technology / Intel / Trusted Computing Group / IBM System x / Cloud computing / Computing / Computer security

PDF Document

Add to Reading List

Source URL: www.intel.de

Language: English - Date: 2014-03-01 01:08:58
26Trusted computing / Disk encryption / Cryptography / Trusted Platform Module / Trusted Computing Group / Cryptographic software / Trusted Execution Technology / BitLocker Drive Encryption / BIOS / Computer security / System software / Software

OSLO: Improving the security of Trusted Computing Bernhard Kauer Technische Universität Dresden Department of Computer ScienceDresden, Germany

Add to Reading List

Source URL: os.inf.tu-dresden.de

Language: English - Date: 2007-05-22 08:46:36
27Computing / Unified Extensible Firmware Interface / System Management Mode / X86 virtualization / Rootkit / Trusted Execution Technology / Personal computer hardware / Virtual machine / Booting / System software / Software / BIOS

Into the Unknown: Assessing your BIOS Vulnerabilities Xeno Kovah Lead InfoSec Engineer MITRE Approved for Public Release; Distribution Unlimited. Case Number

Add to Reading List

Source URL: dl.mandiant.com

Language: English - Date: 2015-05-11 08:19:08
28BIOS / Trusted computing / Trusted Platform Module / Trusted Execution Technology / Disk encryption / Trusted Computing Group / BitLocker Drive Encryption / Unified Extensible Firmware Interface / System Management Mode / Computer security / System software / Computing

Problems with the Static Root of Trust for Measurement John Butterworth Corey Kallenberg Xeno Kovah Amy Herzog

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2013-07-31 03:56:11
29Computing / Cloud computing / Intel vPro / Trusted computing / Trusted Execution Technology / Trusted Platform Module

Trusted Compute Pools Feature in oVirt Oct 22, 2013 Gang Wei, Haitao Shan,

Add to Reading List

Source URL: www.linux-kvm.org

Language: English - Date: 2013-11-03 05:32:36
30Trusted Platform Module / Trusted Computing Group / Disk encryption / Unified Extensible Firmware Interface / Two-factor authentication / X.509 / Trusted Execution Technology / BitLocker Drive Encryption / Computer security / Cryptography / Trusted computing

TRUSTED TAMPERPROOF TIME ON MOBILE DEVICES Trusted Tamperproof Time on Mobile Devices Using TPM 2.0 Services with Remote Attestation August 2, 2013

Add to Reading List

Source URL: www.jwsecure.com

Language: English - Date: 2014-12-16 20:21:45
UPDATE