Trusted Platform Module

Results: 234



#Item
131Cryptography / Business law / Copyright law / Trusted Platform Module / Trusted computing base / Ring / Vulnerability / Password / Trusted system / Computer security / Security / Trusted computing

Idea: Trusted Emergency Management Timothy E. Levin1 , Cynthia E. Irvine1 , Terry V. Benzel2 , Thuy D. Nguyen1 , Paul C. Clark1 , and Ganesha Bhaskara2 1 2

Add to Reading List

Source URL: www.cisr.us

Language: English - Date: 2009-06-04 09:26:02
132Trusted Platform Module / Trusted Computing Group / Next-Generation Secure Computing Base / Trusted Execution Technology / TPM / Random oracle / Secure two-party computation / Direct Anonymous Attestation / Computer security / Trusted computing / Cryptography

Exploring Trusted Platform Module Capabilities: A Theoretical and Experimental Study

Add to Reading List

Source URL: nsl.cse.unt.edu

Language: English - Date: 2011-12-22 15:11:06
133Remote desktop / Trusted computing / Trusted Platform Module / X Window System / Trusted Execution Technology / Google Chrome OS / Thin client / Desktop virtualization / Hyper-V / Software / System software / Computing

Cloud Terminal: Secure Access to Sensitive Applications from Untrusted Systems Lorenzo Martignoni,∗ Pongsin Poosankam,∗† Matei Zaharia,∗ Jun Han,† Stephen McCamant,∗ Dawn Song,∗ Vern Paxson,∗ Adrian Perri

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2012-05-07 17:38:00
134Trusted computing / Computer network security / Trusted Platform Module / Trusted Execution Technology / Hypervisor / Virtual private server / Hyper-V / Computer security / IBM cloud computing / Cloud computing / System software / Computing

DRAFT NISTIR 7904, Trusted Geolocation in the Cloud: Proof of Concept Implementation

Add to Reading List

Source URL: nccoe.nist.gov

Language: English - Date: 2014-06-27 15:40:55
135Software / Windows Server / Operating system / Trusted Computing / Trusted Platform Module / Multilevel security / Microsoft Windows / Computer security / Windows NT

TVE Trusted Multilevel Computing Solution Simultaneous View of Multiple Security Levels on a Single Computer Overview TVE is a multilevel computing solution that allows users to simultaneously view and access multiple se

Add to Reading List

Source URL: www.gdc4s.com

Language: English - Date: 2014-12-03 04:04:55
136Data security / Crime prevention / National security / Cryptography / Trusted Computing Group / Trusted Computing / Information security management system / Trusted Platform Module / Vulnerability / Computer security / Security / Cyberwarfare

ENISA Quarterly Review Vol. 4, No. 4, Oct-Dec 2008 IN THIS EDITION A Letter from the Executive Director

Add to Reading List

Source URL: www.warp.gov.uk

Language: English - Date: 2014-09-22 09:11:24
137National security / Public safety / Trusted computing / Cryptography / Trusted Platform Module / Computer network security / Corporate Ink / Trusted Computing Group / Information security / Security / Computer security / Crime prevention

Wave Systems Joins TSCP Membership Grows As Solutions Providers Commit to Driving Adoption of Secure Information Sharing Standards HERNDON, Va. (Dec. 21, 2009) ─ Wave Systems Corp. (NASDAQ: WAVX -- www.wave.com), a lea

Add to Reading List

Source URL: www.tscp.org

Language: English - Date: 2013-09-16 22:08:03
138Cryptographic software / Security / Passphrase / Trusted Platform Module / Pre-boot authentication / Password / Disk encryption / Cryptography / Computer security

CPA - Security Characteristic

Add to Reading List

Source URL: www.cesg.gov.uk

Language: English - Date: 2013-04-25 00:20:28
139Trusted computing / Key management / Trusted Platform Module / Cryptographic software / Trusted Computing Group / BitLocker Drive Encryption / Key size / Key / Crypt / Cryptography / Computer security / Disk encryption

Tech Digest Figure Template_1.5 column_01-06-12

Add to Reading List

Source URL: techdigest.jhuapl.edu

Language: English - Date: 2013-09-26 17:29:37
140Security / Disk encryption / Trusted Platform Module / Trusted Execution Technology / Next-Generation Secure Computing Base / Ring / Security token / Physical Unclonable Function / Trusted computing base / Computer security / Trusted computing / Cryptography

INVITED PAPER Mobile Trusted Computing This paper surveys the trusted computing features in mobile computing platforms. By N. Asokan, Jan-Erik Ekberg, Kari Kostiainen, Anand Rajan, Carlos Rozas,

Add to Reading List

Source URL: rebootingcomputing.ieee.org

Language: English - Date: 2014-08-25 09:54:55
UPDATE