Trusted Platform Module

Results: 234



#Item
41Trusted Computing Group / Trusted Platform Module / Cryptography / Rootkit / Computer security / Cyberwarfare / Trusted computing

The Diversity of TPMs and its Effects on Development A Case Study of Integrating the TPM into OpenSolaris ∗ Anna Shubina

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2010-11-09 19:13:24
42Trusted computing / Solaris Containers / Solaris / Trusted Platform Module / Trusted Execution Technology / DTrace / Virtual machine / Operating system / Ring / System software / Software / Computer security

Trusted Virtual Containers on Demand Katelin A. Bailey † ∗

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2010-11-08 12:53:06
43Trusted computing / Digital rights management / Computing / Informed consent / Interoperability / Privacy / Trusted Platform Module / Bill C-60 / Ethics / Computer security / Copyright law

Rights Management Information (RMI) and Technical Protection Measures (TPM) when applied to works and performances under copyright are increasingly protected by law in countries throughout the world, to comply with the p

Add to Reading List

Source URL: www.cptech.org

Language: English - Date: 2015-05-04 09:52:40
44Computing / Cloud computing / Intel vPro / Trusted computing / Trusted Execution Technology / Trusted Platform Module

Trusted Compute Pools Feature in oVirt Oct 22, 2013 Gang Wei, Haitao Shan,

Add to Reading List

Source URL: kvm.et.redhat.com

Language: English - Date: 2013-11-03 05:32:36
45Ethics / Cryptography / Business law / Copyright law / Trusted Platform Module / Integrity / Data integrity / Kernel / SPARK / Computing / Computer security / Trusted computing

Remote Attestation to Dynamic System Properties: Towards Providing Complete System Integrity Evidence ∗ † Chongkyung Kil§, Emre C. Sezer§, Ahmed M. Azab§, Peng Ning§, Xiaolan Zhang†† †† §

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:05
46Computer security / Software / BitLocker Drive Encryption / FileVault / McAfee / Trusted Platform Module / Encryption / Comparison of disk encryption software / AES instruction set / Disk encryption / Cryptographic software / Microsoft Windows

PDF Document

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2015-04-10 13:14:02
47PBKDF2 / Password manager / Password / Cryptographic software / Passphrase / Key management / Trusted Platform Module / Key stretching / Sticky Password Manager / Cryptography / Computer security / Security

PDF Document

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2012-04-07 15:32:02
48Next-Generation Secure Computing Base / Trusted Execution Technology / Trusted Network Connect / Trusted Computing Group / Computer security / Trusted computing / Trusted Platform Module

Trusted Computing and Free Software RMLL 2009 – Nantes Frédéric Guihéry AMOSSYS July 9, 2009

Add to Reading List

Source URL: www.amossys.fr

Language: English - Date: 2012-07-25 04:35:25
49Computing / Computer architecture / Control-Alt-Delete / Password / Windows Vista / Disk encryption / Computer security / Trusted computing / Trusted Platform Module

Application Note Fingerprint Console Fingerprint Console Document revision <0.5> March 2008

Add to Reading List

Source URL: download.lenovo.com

Language: English - Date: 2009-04-13 02:48:25
50Trusted computing / Disk encryption / Cryptography / Trusted Platform Module / Trusted Computing Group / Cryptographic software / Trusted Execution Technology / BitLocker Drive Encryption / BIOS / Computer security / System software / Software

OSLO: Improving the security of Trusted Computing Bernhard Kauer Technische Universität Dresden Department of Computer ScienceDresden, Germany

Add to Reading List

Source URL: os.inf.tu-dresden.de

Language: English - Date: 2007-05-22 08:46:36
UPDATE