Trusted Platform Module

Results: 234



#Item
21Trusted Computing Platform Alliance: The Mother(board) of all Big Brothers Lucky Green cypherpunks.to

Trusted Computing Platform Alliance: The Mother(board) of all Big Brothers Lucky Green cypherpunks.to

Add to Reading List

Source URL: www.cypherpunks.to

Language: English - Date: 2011-09-20 13:07:03
22Trusted Platform Module Library Part 3: Commands Family “2.0” Level 00 RevisionMarch 13, 2014 Committee Draft

Trusted Platform Module Library Part 3: Commands Family “2.0” Level 00 RevisionMarch 13, 2014 Committee Draft

Add to Reading List

Source URL: www.trustedcomputinggroup.org

Language: English - Date: 2014-03-14 15:31:43
    23A Logic of Secure Systems and its Application to Trusted Computing Anupam Datta Jason Franklin  Deepak Garg

    A Logic of Secure Systems and its Application to Trusted Computing Anupam Datta Jason Franklin Deepak Garg

    Add to Reading List

    Source URL: www.cs.cmu.edu

    Language: English - Date: 2009-06-02 14:26:22
    24Towards Verified C specification for TPM API Aybek Mukhamedov, Andy Gordon and Mark Ryan  Trusted Platform Module

    Towards Verified C specification for TPM API Aybek Mukhamedov, Andy Gordon and Mark Ryan Trusted Platform Module

    Add to Reading List

    Source URL: www.cs.bham.ac.uk

    Language: English - Date: 2010-03-26 11:31:43
      25Towards a Verified Reference Implementation of a Trusted Platform Module Aybek Mukhamedov1,2 , Andrew D. Gordon1 , and Mark Ryan2 1  2

      Towards a Verified Reference Implementation of a Trusted Platform Module Aybek Mukhamedov1,2 , Andrew D. Gordon1 , and Mark Ryan2 1 2

      Add to Reading List

      Source URL: www.cs.bham.ac.uk

      Language: English - Date: 2010-04-20 09:53:15
        26KISS: “Key it Simple and Secure” Corporate Key Management Zongwei Zhou, Jun Han, Yue-Hsun Lin, Adrian Perrig, Virgil Gligor CyLab and Carnegie Mellon University, Pittsburgh, Pennsylvania, United States {stephenzhou,

        KISS: “Key it Simple and Secure” Corporate Key Management Zongwei Zhou, Jun Han, Yue-Hsun Lin, Adrian Perrig, Virgil Gligor CyLab and Carnegie Mellon University, Pittsburgh, Pennsylvania, United States {stephenzhou,

        Add to Reading List

        Source URL: www.netsec.ethz.ch

        Language: English - Date: 2015-06-01 09:06:14
        27MiniBox: A Two-Way Sandbox for x86 Native Code Yanlin Li, Adrian Perrig, Jonathan McCune, James Newsome, Brandon Baker, Will Drewry February 21, 2014  CMU-CyLab

        MiniBox: A Two-Way Sandbox for x86 Native Code Yanlin Li, Adrian Perrig, Jonathan McCune, James Newsome, Brandon Baker, Will Drewry February 21, 2014 CMU-CyLab

        Add to Reading List

        Source URL: www.netsec.ethz.ch

        Language: English - Date: 2015-06-01 09:06:11
        28ARCHITECT’S GUIDE: CYBERSECURITY October 2013 Trusted Computing Group 3855 SW 153rd Drive Beaverton, OR 97006

        ARCHITECT’S GUIDE: CYBERSECURITY October 2013 Trusted Computing Group 3855 SW 153rd Drive Beaverton, OR 97006

        Add to Reading List

        Source URL: www.trustedcomputinggroup.org

        Language: English - Date: 2013-12-06 18:21:27
        29

        PDF Document

        Add to Reading List

        Source URL: www.trustedcomputinggroup.org

        Language: English - Date: 2010-09-13 09:37:20
        30“Secure Password Managers” and “Military-Grade Encryption” on Smartphones: Oh, Really? Andrey Belenko and Dmitry Sklyarov Elcomsoft Co. Ltd.

        “Secure Password Managers” and “Military-Grade Encryption” on Smartphones: Oh, Really? Andrey Belenko and Dmitry Sklyarov Elcomsoft Co. Ltd.

        Add to Reading List

        Source URL: media.blackhat.com

        Language: English - Date: 2012-04-07 15:32:02