Trusted Platform Module

Results: 234



#Item
151Trusted computing / Key management / Cryptographic protocols / Trusted Platform Module / Trusted Computing Group / Certificate authority / HTTP Secure / Public key certificate / Counter / Cryptography / Computer security / Public-key cryptography

Offline Untrusted Storage with Immediate Detection of Forking and Replay Attacks ∗ Marten van Dijk, Jonathan Rhodes, Luis F. G. Sarmenta, and Srinivas Devadas Computer Science and Artificial Intelligence Laboratory (CS

Add to Reading List

Source URL: projects.csail.mit.edu

Language: English - Date: 2007-08-28 16:29:40
152Fujitsu / Trusted Platform Module / Interactive kiosk / Optical character recognition / Computing / Technology / Economy of Japan

Technology Showcase @ TRIOLE Center Fujitsu North America Technology Forum 2010 Technology Café Triole

Add to Reading List

Source URL: www.fujitsu.com

Language: English - Date: 2010-11-02 13:41:33
153Trusted computing / Trusted Platform Module / Cryptographic nonce / Revocation list / Certificate authority / Counter / Transmission Control Protocol / Public key certificate / Trusted Computing Group / Cryptography / Public-key cryptography / Key management

Securing Shared Untrusted Storage by using TPM 1.2 Without Requiring a Trusted OS Marten van Dijk, Luis F. G. Sarmenta, Jonathan Rhodes, and Srinivas Devadas MIT Computer Science and Artificial Intelligence Laboratory (C

Add to Reading List

Source URL: csg.csail.mit.edu

Language: English - Date: 2007-05-24 15:48:08
154Trusted computing / Smart cards / Public-key cryptography / Closure / Subroutines / Trusted Platform Module / Variable / Java Card / Trusted Execution Technology / Cryptography / Computer security / Computing

The Trusted Execution Module: Commodity General-Purpose Trusted Computing Victor Costan, Luis F. G. Sarmenta, Marten van Dijk, and Srinivas Devadas MIT Computer Science and Artificial Intelligence Laboratory, Cambridge,

Add to Reading List

Source URL: projects.csail.mit.edu

Language: English - Date: 2008-09-09 21:32:55
155Trusted Computing Group / Trusted Platform Module / Direct Anonymous Attestation / TSS / Computer security / Cryptography / Trusted computing

TCG Software Stack (TSS) Specification Version 1.2 Level 1 Errata A Part1: Commands and Structures

Add to Reading List

Source URL: www.trustedcomputinggroup.org

Language: English - Date: 2009-04-01 21:38:38
156Error detection and correction / Cryptography / Cryptographic hash functions / Trusted Platform Module / Trusted Computing Group / Trusted Execution Technology / Next-Generation Secure Computing Base / Counter / Hash tree / Computer security / Trusted computing / Hashing

Virtual Monotonic Counters and Count-Limited Objects using a TPM without a Trusted OS ∗ Luis F. G. Sarmenta, Marten van Dijk, Charles W. O’Donnell, Jonathan Rhodes, and Srinivas Devadas

Add to Reading List

Source URL: projects.csail.mit.edu

Language: English - Date: 2006-08-31 18:21:40
157Government / Electronic voting / Voting machine / Electoral fraud / Voter database / Trusted Platform Module / Ballot / Voting system / Vote counting system / Politics / Elections / Election fraud

C OMP U T ING PR AC T ICE S Trustworthy Voting: From Machine to System Nathanael Paul and Andrew S. Tanenbaum

Add to Reading List

Source URL: www.csiir.ornl.gov

Language: English - Date: 2010-03-31 18:05:52
158Trusted computing / Virtual machines / Windows Server / Trusted Execution Technology / x86 architecture / Trusted Platform Module / Virtual appliance / Hypervisor / Cloud computing / System software / Software / Computing

LNCS[removed]Introducing the Trusted Virtual Environment Module: A New Mechanism for Rooting Trust in Cloud Computing

Add to Reading List

Source URL: www.cisa.umbc.edu

Language: English - Date: 2012-01-13 12:57:13
159Trusted computing / Cryptography / File sharing networks / Internet privacy / Direct Anonymous Attestation / Peer-to-peer computing / Trusted Platform Module / Peer-to-peer / Social peer-to-peer processes / Computer security / Computing / Concurrent computing

Trusted Computing: Providing Security for Peer-to-Peer Networks Shane Balfe, Amit D. Lakhani and Kenneth G. Paterson, Information Security Group, Royal Holloway, University of London, United Kingdom. {S.Balfe,Amit.Lakhan

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2005-06-23 08:33:02
160Trusted Platform Module / Payment systems / EMV / Peer-to-peer / Chip and PIN / Computer security / Trusted computing / Cryptography

Secure Payment Architectures and Other Applications of Trusted Computing Shane Balfe Technical Report RHUL–MA–2009–10

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2009-02-20 05:26:26
UPDATE