Trusted Execution Technology

Results: 107



#Item
31Business law / Copyright law / Direct Anonymous Attestation / Trusted Platform Module / Kerberos / Ticket Granting Ticket / Trusted Execution Technology / Computer security / Cryptography / Trusted computing

Implementation of a Trusted Ticket System Andreas Leicher1 , Nicolai Kuntze2 , and Andreas U. Schmidt3 1 Johann Wolfgang Goethe-Universität, Frankfurt am Main,Germany,

Add to Reading List

Source URL: andreas.schmidt.novalyst.de

Language: English - Date: 2009-01-06 04:23:23
32Electronics / Trusted Platform Module / Trusted Computing Group / Mobile telecommunications / Wireless / Mobile phone / Bluetooth / Next-Generation Secure Computing Base / Trusted Execution Technology / Technology / Computer security / Trusted computing

TECHNOLOGY NEWS Will Proposed Standard Make Mobile Phones More Secure?

Add to Reading List

Source URL: leavcom.com

Language: English - Date: 2013-04-12 14:46:43
33Trusted computing / Complexity classes / Formal verification / Trusted Execution Technology / Trusted Platform Module / Adversary model / Replay attack / Interrupt / IP / Theoretical computer science / Cryptography / Applied mathematics

Systematic Treatment of Remote Attestation Aurelien Francillon Networking and Security Group Eurecom Instutute

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-12-20 17:27:19
34Computing / Trusted Execution Technology / x86 architecture / Trusted Platform Module / Intel Core / Intel / Xeon / X86 virtualization / Intel vPro / Computer security / Trusted computing / System software

Trusted Compute Pools with Intel® Trusted Execution Technology (Intel® TXT) HOST SENSITIVE WORKLOADS ON TRUSTED SERVERS IN MULTI-TENANT ENVIRONMENTS Intel® TXT with Trusted Boot (Tboot)

Add to Reading List

Source URL: www.intel.de

Language: English - Date: 2015-03-19 07:31:59
35Remote desktop / Trusted computing / Trusted Platform Module / X Window System / Trusted Execution Technology / Google Chrome OS / Thin client / Desktop virtualization / Hyper-V / Software / System software / Computing

Cloud Terminal: Secure Access to Sensitive Applications from Untrusted Systems Lorenzo Martignoni,∗ Pongsin Poosankam,∗† Matei Zaharia,∗ Jun Han,† Stephen McCamant,∗ Dawn Song,∗ Vern Paxson,∗ Adrian Perri

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2014-02-02 20:47:34
36Trusted Computing Group / Trusted Execution Technology / Open Vulnerability and Assessment Language / Total productive maintenance / Direct TPMS / Computer security / Trusted computing / Trusted Platform Module

Using the Trusted Platform Module to Enhance OVAL Driven Assessments

Add to Reading List

Source URL: oval.mitre.org

Language: English - Date: 2011-03-24 06:59:43
37Software bugs / X86 architecture / Trusted Execution Technology / Trusted computing / Rootkit / Malware / X86 virtualization / Buffer overflow / Intel / System software / Computer security / Computing

Mitigating Exploits, Rootkits and Advanced Persistent Threats David Durham, Senior Principal Engineer Intel Corporation

Add to Reading List

Source URL: www.hotchips.org

Language: English - Date: 2014-08-10 23:56:01
38Cryptography / Central processing unit / Ring / Hypervisor / Trusted Execution Technology / Malware / Smartphone / Tamper resistance / Integrity / System software / Computer security / Security

Mobile Hardware Security Vikas Chandra and Rob Aitken ARM R&D Hot Chips, August 2014

Add to Reading List

Source URL: www.hotchips.org

Language: English - Date: 2014-08-10 23:55:59
39Cryptography / Trusted computing / Unified Extensible Firmware Interface / Trusted Execution Technology / Trusted Platform Module / Trusted computing base / Side channel attack / Hypervisor / Tamper resistance / Computer security / Security / System software

SECURE SYSTEMS DESIGN LEENDERT VAN DOORN CORPORATE FELLOW [removed] 1

Add to Reading List

Source URL: www.hotchips.org

Language: English - Date: 2014-08-10 23:56:00
40Electronics / Trusted Platform Module / Trusted Computing Group / Mobile telecommunications / Wireless / Mobile phone / Bluetooth / Next-Generation Secure Computing Base / Trusted Execution Technology / Technology / Computer security / Trusted computing

TECHNOLOGY NEWS Will Proposed Standard Make Mobile Phones More Secure?

Add to Reading List

Source URL: www.leavcom.com

Language: English - Date: 2013-04-12 14:46:43
UPDATE