Trusted Platform Module

Results: 234



#Item
111Trusted computing / Next-Generation Secure Computing Base / Trusted computing base / Trusted Platform Module / Microkernel / Trustworthy computing / Kernel / Ring / Virtual machine / Computer security / Computing / Security

Nexus: A New Operating System for Trustworthy Computing Alan Shieh Dan Williams

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2005-11-12 14:33:40
112Ethics / Next-Generation Secure Computing Base / Digital rights management / Trusted Platform Module / Information Rights Management / Z / Privacy / Digital rights / Trusted Computing Group / Computer security / Trusted computing / Copyright law

Microsoft PowerPoint - Mason Trusted Computing & Integrity of Govt-held Info.ppt

Add to Reading List

Source URL: www.oecd.org

Language: English - Date: 2014-07-21 01:39:58
113Disk encryption / Trusted Platform Module / Trusted Execution Technology / Windows Vista / Direct Anonymous Attestation / BitLocker Drive Encryption / Computer security / Trusted computing / Cryptography

Falsification Prevention and Protection Technologies and Products NEC’s Attitude to “Trusted Computing” By Takahisa SHIRAKAWA* NEC attaches great importance to security for its business PCs (The brand names of NE

Add to Reading List

Source URL: www.nec.com

Language: English - Date: 2013-10-21 08:29:13
114Trusted computing / Identity management / Cryptography / Procfs / Unix / Next-Generation Secure Computing Base / Kernel / Nexus / Trusted Platform Module / Computer architecture / Software / System software

Logical Attestation: An Authorization Architecture for Trustworthy Computing Emin Gün Sirer Willem de Bruijn† Patrick Reynolds‡ Alan Shieh Kevin Walsh Dan Williams Fred B. Schneider Computer Science Department, Corn

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2011-09-24 15:57:36
115Trusted Platform Module / Cipher / Espionage / Cyberwarfare / Export of cryptography in the United States / Cryptography / Computer security / Encryption

TheRegulationofEncryptionProductsinChina XiaYuandMatthewMurphy,MMLCGroup Introduction The Chinese encryption products market has been developing strongly since the early 1990s with a market

Add to Reading List

Source URL: www.mmlcgroup.com

Language: English - Date: 2013-08-19 07:07:14
116Trusted computing / Business law / Copyright law / Cryptography / Computing / Malware / Trusted Platform Module / Vulnerability / Computer / Computer security / Security / Cyberwarfare

From the Editors Trusted Computing in Context M

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2007-05-09 19:34:30
117Trusted computing / Disk encryption / Trusted Platform Module / Hewlett-Packard / Cold boot attack / Public-key cryptography / Virtualization / Performance measurement / Cryptography / Computer security / Computing

The CloudProxy Tao for Trusted Computing John Manferdelli Tom Roeder Fred Schneider

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2013-09-10 19:44:59
118Internet privacy / Networking hardware / Trusted computing / Internet protocols / Internet standards / Router / Network switch / Forwarding plane / Trusted Platform Module / Computing / Internet / Network architecture

NetQuery: A Knowledge Plane for Reasoning about Network Properties Alan Shieh Emin Gün Sirer

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2011-06-13 18:29:48
119Disk encryption / Cryptographic software / Windows Vista / Trusted computing / Windows Server / BitLocker Drive Encryption / Trusted Platform Module / Next-Generation Secure Computing Base / Encrypting File System / Microsoft Windows / System software / Software

Secure Startup–Full Volume Encryption: Technical Overview - 20

Add to Reading List

Source URL: download.microsoft.com

Language: English - Date: 2006-06-22 16:03:10
120Trusted computing / Disk encryption / Trusted Platform Module / Internet protocols / Trusted Computing Group / Secure Shell / Firewall / Network security / Laptop / Computer security / Computing / Computer network security

Initial Tiger Team Report on Potential TPM Vulnerability, and Mitigation Plan Team Members: Peter Leight / Richard Hammer June 2, 2006 Executive Summary:

Add to Reading List

Source URL: www.sans.edu

Language: English - Date: 2012-08-27 18:45:06
UPDATE