Trusted Execution Technology

Results: 107



#Item
51Computer hardware / Intel Core / Intel / Xeon / Trusted Execution Technology / Hyper-threading / X86 virtualization / Intel vPro / Intel Active Management Technology / System software / Computing / X86 architecture

Intel Insights at SC11 Dr. Rajeeb Hazra General Manager Intel Technical Computing Group Illuminate Insight Solve Intel® Technical Computing Group

Add to Reading List

Source URL: newsroom.intel.com

Language: English - Date: 2015-01-29 22:15:41
52Intel / Computer network security / McAfee / Malware / Trusted Execution Technology / Cloud computing / Trend Micro / Application security / Network security / Computing / Computer security / Security

Intel Corporation 2200 Mission College Blvd. P.O. Box[removed]Santa Clara, CA[removed]Backgrounder

Add to Reading List

Source URL: download.intel.com

Language: English - Date: 2012-09-12 11:23:46
53Computer hardware / Intel Core / Intel / Xeon / Trusted Execution Technology / Hyper-threading / X86 virtualization / Intel vPro / Intel Active Management Technology / System software / Computing / X86 architecture

Intel Insights at SC11 Dr. Rajeeb Hazra General Manager Intel Technical Computing Group Illuminate Insight Solve Intel® Technical Computing Group

Add to Reading List

Source URL: newsroom.intel.com

Language: English - Date: 2015-01-29 22:05:35
54Remote desktop / Trusted computing / Trusted Platform Module / X Window System / Trusted Execution Technology / Google Chrome OS / Thin client / Desktop virtualization / Hyper-V / Software / System software / Computing

Cloud Terminal: Secure Access to Sensitive Applications from Untrusted Systems Lorenzo Martignoni,∗ Pongsin Poosankam,∗† Matei Zaharia,∗ Jun Han,† Stephen McCamant,∗ Dawn Song,∗ Vern Paxson,∗ Adrian Perri

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2014-12-31 23:51:31
55X86 architecture / Out-of-band management / Intel vPro / Trusted computing / Intel Active Management Technology / Intel / Trusted Execution Technology / X86 virtualization / AES instruction set / Computing / System software / Computer architecture

September[removed]Real-World Guide Enterprise Mobile Security: 4th Generation Intel® Core™

Add to Reading List

Source URL: i.crn.com

Language: English - Date: 2014-11-11 19:10:30
56Trusted Platform Module / Trusted Computing Group / Next-Generation Secure Computing Base / Trusted Execution Technology / TPM / Random oracle / Secure two-party computation / Direct Anonymous Attestation / Computer security / Trusted computing / Cryptography

Exploring Trusted Platform Module Capabilities: A Theoretical and Experimental Study

Add to Reading List

Source URL: nsl.cse.unt.edu

Language: English - Date: 2011-12-22 15:11:06
57Remote desktop / Trusted computing / Trusted Platform Module / X Window System / Trusted Execution Technology / Google Chrome OS / Thin client / Desktop virtualization / Hyper-V / Software / System software / Computing

Cloud Terminal: Secure Access to Sensitive Applications from Untrusted Systems Lorenzo Martignoni,∗ Pongsin Poosankam,∗† Matei Zaharia,∗ Jun Han,† Stephen McCamant,∗ Dawn Song,∗ Vern Paxson,∗ Adrian Perri

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2012-05-07 17:38:00
58Trusted computing / Computer network security / Trusted Platform Module / Trusted Execution Technology / Hypervisor / Virtual private server / Hyper-V / Computer security / IBM cloud computing / Cloud computing / System software / Computing

DRAFT NISTIR 7904, Trusted Geolocation in the Cloud: Proof of Concept Implementation

Add to Reading List

Source URL: nccoe.nist.gov

Language: English - Date: 2014-06-27 15:40:55
59Intel vPro / Trusted Execution Technology / X86 virtualization / Intel / Hypervisor / Ring / Virtualization / Hyper-V / Operating system / System software / Software / Virtual machines

Solution Brief Intel® vPro™ Technology Trusted Platform Management Department of Defense Creates a Secure, Virtualized Environment

Add to Reading List

Source URL: www.gdc4s.com

Language: English - Date: 2014-12-02 04:04:55
60Computing / Out-of-band management / Intel vPro / Intel Active Management Technology / Intel / Trusted Execution Technology / AES instruction set / X86 virtualization / McAfee / System software / X86 architecture / Computer architecture

Sales Brief Intel and McAfee 2013 Security Benefits Intel and McAfee deliver a new level of strengthened security innovation utilizing embedded hardware security technologies for unprecedented protection and

Add to Reading List

Source URL: smb.intel.in

Language: English - Date: 2013-08-23 21:00:30
UPDATE