Trusted Platform Module

Results: 234



#Item
171Error detection and correction / Cryptography / Computing / Security / Hash tree / Venti / Trusted Platform Module / Cache / Hash list / Hashing / Computer security / Cryptographic hash functions

Authenticated Storage Using Small Trusted Hardware Hsin-Jung Yang, Victor Costan, Nickolai Zeldovich, and Srinivas Devadas Computer Science and Artificial Intelligence Laboratory Massachusetts Institute of Technology Cam

Add to Reading List

Source URL: people.csail.mit.edu

Language: English
172Trusted Computing Group / Trusted Execution Technology / Ring / Firmware / Booting / Operating system / BitLocker Drive Encryption / Disk encryption / Computer security / Trusted computing / Trusted Platform Module

Trusted Mobile Devices: Requirements for a Mobile Trusted Platform Module Kathleen N. McGill n recent years, mobile devices have replaced desktop PCs as the computing platform of choice for many users. Unfortunately, mos

Add to Reading List

Source URL: techdigest.jhuapl.edu

Language: English - Date: 2013-09-26 17:27:04
173Cloud infrastructure / Trusted computing / Eucalyptus / Virtual machine / VM / Hyper-V / Trusted Platform Module / Live migration / Cloud computing / System software / Software / Computing

Towards Trusted Cloud Computing Nuno Santos Krishna P. Gummadi Rodrigo Rodrigues

Add to Reading List

Source URL: www.mpi-sws.org

Language: English - Date: 2009-05-29 11:15:10
174Cryptography / Trusted Platform Module / Next-Generation Secure Computing Base / Cloud computing / Node / Eucalyptus / Public-key cryptography / Computer security / Trusted computing / Computing

Policy-Sealed Data: A New Abstraction for Building Trusted Cloud Services Nuno Santos, Rodrigo Rodrigues†, Krishna P. Gummadi, Stefan Saroiu‡ MPI-SWS, † CITI/Universidade Nova de Lisboa, ‡ Microsoft Research Abst

Add to Reading List

Source URL: www.mpi-sws.org

Language: English - Date: 2012-07-17 05:59:19
175Trusted Computing Group / Trusted Execution Technology / Ring / Firmware / Booting / Operating system / BitLocker Drive Encryption / Disk encryption / Computer security / Trusted computing / Trusted Platform Module

Trusted Mobile Devices: Requirements for a Mobile Trusted Platform Module Kathleen N. McGill n recent years, mobile devices have replaced desktop PCs as the computing platform of choice for many users. Unfortunately, mos

Add to Reading List

Source URL: www.jhuapl.edu

Language: English - Date: 2013-09-26 17:27:04
176Trusted computing / Key management / Trusted Platform Module / Cryptographic software / Trusted Computing Group / BitLocker Drive Encryption / Key size / Key / Crypt / Cryptography / Computer security / Disk encryption

Tech Digest Figure Template_1.5 column_01-06-12

Add to Reading List

Source URL: www.jhuapl.edu

Language: English - Date: 2013-09-26 17:29:37
177Computer network security / APL programming language family / Trusted computing / Cryptography / Trustworthy computing / APL / Malware / Trusted Platform Module / Computer virus / Computing / Computer security / Security

Trustworthy Computing: Making Cyberspace Safe—Guest Editor’s Introduction

Add to Reading List

Source URL: www.jhuapl.edu

Language: English - Date: 2013-09-27 10:05:08
178Security / Hardware-based full disk encryption / Pre-boot authentication / Two-factor authentication / Trusted Platform Module / Password / One-time password / Authentication / USB flash drive / Disk encryption / Cryptography / Computer security

YubiKey Integration for Full Disk Encryption Pre-Boot Authentication Version 1.2 May 7, 2012

Add to Reading List

Source URL: www.yubico.com

Language: English - Date: 2012-10-03 05:01:29
179Military organization / Telecommunications engineering / Military science / NetOps / LandWarNet / Trusted Platform Module

Trusted Platform Module (TPM) Element Manager

Add to Reading List

Source URL: www.netcom.army.mil

Language: English - Date: 2009-10-26 18:31:18
180FIPS 140-3 / FIPS 140 / Cryptographic Module Validation Program / Advanced Encryption Standard / Trusted Platform Module / Hardware random number generator / AES instruction set / Key size / Zeroisation / Cryptography / Cryptography standards / FIPS 140-2

Legend (type of comment) E = Editorial G = General T = Technical SECTION, SUBSECT

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-02 13:14:00
UPDATE