Trusted Platform Module

Results: 234



#Item
101Computer security / Software / BitLocker Drive Encryption / FileVault / McAfee / Trusted Platform Module / Encryption / Comparison of disk encryption software / AES instruction set / Disk encryption / Cryptographic software / Microsoft Windows

Business Brief Management of Native Encryption For Apple FileVault and Microsoft BitLocker

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2015-03-10 16:12:34
102Cryptography / Disk encryption / Trusted Platform Module / Trusted Computing Group / Cryptographic software / BitLocker Drive Encryption / TPM / USB flash drive / Next-Generation Secure Computing Base / Computer security / Microsoft Windows / Trusted computing

TPM 2.0 Library Studienarbeit Department of Computer Science University of Applied Science Rapperswil Autumn Term 2013

Add to Reading List

Source URL: eprints.hsr.ch

Language: English - Date: 2014-04-25 08:10:54
103Trusted computing / Next-Generation Secure Computing Base / PlayReady / Copy Control / Trusted Platform Module / InterTrust Technologies / Copy protection / OMA DRM / Protected Media Path / Computer security / Digital rights management / Copyright law

Technological Copyright Enforcement and Open Access Volker Grassmuck for Open Archives Forum Workshop[removed]HU Berlin

Add to Reading List

Source URL: www.oaforum.org

Language: English - Date: 2003-10-17 10:49:35
104Trusted Platform Module / Next-Generation Secure Computing Base / Emulator / TPM / Virtual machine / Virtualization / Direct Anonymous Attestation / Computer security / Trusted computing / Cryptography

vii TABLE OF CONTENTS CHAPTER

Add to Reading List

Source URL: eprints.utm.my

Language: English - Date: 2012-07-15 20:40:54
105Academia / Education / Emulator / Trusted Platform Module / MODUL University Vienna

MIGRATION VIRTUAL TRUSTED PLATFORM MODULE STATE USING TPM EMULATOR KILAUSURIA BT ABDULLAH A thesis submitted in fulfillment of the

Add to Reading List

Source URL: eprints.utm.my

Language: English - Date: 2012-07-15 20:40:47
106Windows Mobile / Smartphones / Windows NT / BIOS / Unified Extensible Firmware Interface / BitLocker Drive Encryption / Windows Phone / Microsoft SharePoint / Trusted Platform Module / Software / Microsoft Windows / Computing

The information contained in this document represents the current view of Microsoft Corp. on the issues discussed as of the date of publication. Because Microsoft must respond to changing market conditions, it should not

Add to Reading List

Source URL: download.microsoft.com

Language: English - Date: 2013-06-04 05:12:25
107Cryptography standards / Trusted computing / Cryptographic software / Trusted Platform Module / Windows XP / PKCS11 / Microsoft CryptoAPI / Security token / Smart card / Microsoft Windows / Cryptography / Computer security

smart security interface virtual smart card Logical Access Client for Trusted Platform Modules Windows, Linux, Mac

Add to Reading List

Source URL: www.charismathics.com

Language: English - Date: 2013-11-21 10:48:12
108Trusted computing / Cryptography / Virtual machines / Business law / Copyright law / Trusted Platform Module / Cloud computing / Grid computing / VMware / System software / Computer security / Software

CHAPTER 1 INTRODUCTION 1.1

Add to Reading List

Source URL: eprints.utm.my

Language: English - Date: 2012-07-15 20:40:51
109Disk encryption / Cryptographic software / Windows Vista / Windows Server / Trusted computing / BitLocker Drive Encryption / Encrypting File System / Trusted Platform Module / Data security / Microsoft Windows / Software / System software

Secure Startup – Full Volume Encryption: Executive Overview - 8 Secure Startup – Full Volume Encryption: Executive Overview

Add to Reading List

Source URL: download.microsoft.com

Language: English - Date: 2006-06-22 16:02:52
110Trusted computing / Cryptography / Hashing / Monolithic kernels / Next-Generation Secure Computing Base / Trusted Platform Module / Procfs / Kernel / Hash table / Computer architecture / Computing / Computer security

Logical Attestation: An Authorization Architecture for Trustworthy Computing Emin Gün Sirer Willem de Bruijn† Patrick Reynolds‡ Alan Shieh Kevin Walsh Dan Williams Fred B. Schneider Computer Science Department, Corn

Add to Reading List

Source URL: sigops.org

Language: English - Date: 2011-09-20 03:37:00
UPDATE