Trusted Platform Module

Results: 234



#Item
161Cloud infrastructure / Eucalyptus / Trusted Computing / Trusted Platform Module / IBM cloud computing / Rackspace Cloud / Cloud computing / Centralized computing / Computing

Private Virtual Infrastructure for Cloud Computing F. John Krautheim University of Maryland, Baltimore County, 1000 Hilltop Circle, Baltimore, MD[removed]removed] outsourced service. Companies are turning t

Add to Reading List

Source URL: www.cisa.umbc.edu

Language: English - Date: 2010-06-04 12:12:19
162Trusted Platform Module / Smart card / Passphrase / Direct Anonymous Attestation / Trusted Execution Technology / Computer security / Cryptography / Trusted computing

Catching the Cuckoo: Verifying TPM Proximity Using a Quote Timing Side-Channel (short paper) Russell A. Fink1,2 , Alan T. Sherman2 , Alexander O. Mitchell3 , and David C. Challener1 1

Add to Reading List

Source URL: www.cisa.umbc.edu

Language: English - Date: 2012-01-13 15:12:16
163Trusted Platform Module / Trusted computing base / Virtual machine / Ring / Rootkit / Trusted Execution Technology / Trusted Computing Group / Computer security / Trusted computing / Cryptography

TrustVisor: Efficient TCB Reduction and Attestation Jonathan M. McCune, Ning Qu, Yanlin Li Anupam Datta, Virgil D. Gligor, Adrian Perrig March 9, 2009 (revised March 10, 2010)

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2010-07-09 18:37:15
164Access control / Physical Unclonable Function / Randomness / Computer network security / SCADA / Trusted Platform Module / Cyber-physical system / Password / Authentication / Security / Cryptography / Computer security

Restricted Authentication and Encryption for Cyber-physical Systems Michael Kirkpatrick Department of Computer Science Purdue University [removed]

Add to Reading List

Source URL: www.ioc.ornl.gov

Language: English - Date: 2010-02-11 15:47:46
165Electronic voting / Trusted computing / Information technology management / Trustworthy computing / Scantegrity / APL / E2E / Trusted Platform Module / Computer / Computing / Security / Computer security

APPROVAL SHEET Title of Thesis: Applying Trustworthy Computing to End-To-End Electronic Voting Name of Candidate:

Add to Reading List

Source URL: www.cisa.umbc.edu

Language: English - Date: 2010-12-05 17:39:20
166Electronic voting / Election technology / Voting / Voter-verified paper audit trail / Help America Vote Act / Voting machine / Electoral fraud / Trusted Platform Module / Ballot / Politics / Elections / Election fraud

paul-acsac-paper-revised-v1

Add to Reading List

Source URL: www.csiir.ornl.gov

Language: English - Date: 2010-03-31 18:05:52
167Trusted computing / Cryptography / Electronic voting / Information society / Trusted Platform Module / Vote counting system / Smart card / Identity document / Voting system / Computer security / Politics / Security

Microsoft PowerPoint[removed]Leitold e-Voting ER.ppt

Add to Reading List

Source URL: www.coe.int

Language: English - Date: 2006-11-29 10:20:26
168Cryptography / Open Vulnerability and Assessment Language / TPM / Trusted Computing Group / Trusted Execution Technology / Computer security / Trusted computing / Trusted Platform Module

OVAL + The Trusted Platform Module Charles Schmidt June 14, 2010 © 2008 The MITRE Corporation. All rights reserved

Add to Reading List

Source URL: oval.mitre.org

Language: English - Date: 2010-06-16 09:55:57
169Remote desktop / Trusted computing / Trusted Platform Module / X Window System / Trusted Execution Technology / Google Chrome OS / Thin client / Desktop virtualization / Hyper-V / Software / System software / Computing

Cloud Terminal: Secure Access to Sensitive Applications from Untrusted Systems Lorenzo Martignoni,∗ Pongsin Poosankam,∗† Matei Zaharia,∗ Jun Han,† Stephen McCamant,∗ Dawn Song,∗ Vern Paxson,∗ Adrian Perri

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2014-10-02 07:34:55
170Computer network security / APL programming language family / Trusted computing / Cryptography / Trustworthy computing / APL / Malware / Trusted Platform Module / Computer virus / Computing / Computer security / Security

Trustworthy Computing: Making Cyberspace Safe—Guest Editor’s Introduction

Add to Reading List

Source URL: techdigest.jhuapl.edu

Language: English - Date: 2013-09-27 10:05:08
UPDATE