Trusted Platform Module

Results: 234



#Item
211Trusted Execution Technology / Trusted computing base / Trusted Computer System Evaluation Criteria / TCB / Microkernel / Operating system / Secure environment / Next-Generation Secure Computing Base / Computer security / Trusted computing / Trusted Platform Module

Dynamic Root of Trust in Trusted Computing Cong Nie Helsinki University of Technology

Add to Reading List

Source URL: www.tml.tkk.fi

Language: English - Date: 2008-01-03 05:01:33
212Disk encryption / Malware / Trusted Platform Module / Cryptographic software / Trusted Execution Technology / BitLocker Drive Encryption / Rootkit / Computer worm / Computer security / Trusted computing / Cryptography

Cloaking Malware with the Trusted Platform Module Alan M. Dunn

Add to Reading List

Source URL: www.cs.utexas.edu

Language: English - Date: 2011-06-21 00:49:25
213Trusted Platform Module / Trusted Computing Group / Trusted Execution Technology / StrongSwan / Rapperswil / Next-Generation Secure Computing Base / Computer security / Trusted computing / Cryptography

A Root of Trust for Measurement

Add to Reading List

Source URL: security.hsr.ch

Language: English - Date: 2011-06-19 04:27:15
214Computer network security / Electronic commerce / Secure communication / Locks / Padlock / Public-key cryptography / Encryption / Data security / Trusted Platform Module / Security / Cryptography / Computer security

VIA PadLock Security Co-Processor

Add to Reading List

Source URL: www.via.com.tw

Language: English - Date: 2005-10-03 04:03:34
215Disk encryption / Windows Vista / Cryptographic software / Trusted computing / BitLocker Drive Encryption / Windows Server / Trusted Platform Module / Trusted Computing Group / Smart card / Microsoft Windows / Computer security / Computing

Penetration Testing Windows Vista BitLocker Drive Encryption

Add to Reading List

Source URL: www.secguru.com

Language: English - Date: 2006-09-25 10:42:17
216Trusted Computing Group / Trusted Platform Module / TSS / Computer security / Trusted computing / Cryptography

TCG Specification Architecture Overview Specification

Add to Reading List

Source URL: www.trustedcomputinggroup.org

Language: English - Date: 2009-04-15 20:49:01
217Cryptography / Trusted Computing Group / Computer network security / Trusted Platform Module / Computer security / Security / Trusted computing

Trusted Computing Group Information – Version 2.0 Trusted Computing Group

Add to Reading List

Source URL: www.trustedcomputinggroup.org

Language: English - Date: 2009-03-30 19:42:38
218Public-key cryptography / Key / Symmetric-key algorithm / One-time pad / Trusted Platform Module / Cryptography / Computer security / Trusted Computing

Trusted Computing IY5608: The RTM and the TPM Infrastructure Working Group Activity

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2007-02-14 11:20:25
219Trusted computing / Disk encryption / Trusted Platform Module / Cryptographic software / BitLocker Drive Encryption / Password / HMAC / SPEKE / Computer security / Cryptography / Microsoft Windows

Offline dictionary attack on TCG TPM weak authorisation data, and solution Liqun Chen

Add to Reading List

Source URL: www.cs.bham.ac.uk

Language: English - Date: 2009-02-25 10:33:23
220Security / Electronic commerce / Cryptographic protocols / Public-key cryptography / Direct Anonymous Attestation / Trusted Computing / Trusted Platform Module / Secure Electronic Transaction / 3-D Secure / Cryptography / Computer security / Merchant services

Noname manuscript No. (will be inserted by the editor)

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2007-12-14 13:59:43
UPDATE