Trusted Platform Module

Results: 234



#Item
51Trusted Computing  Standards Overview Mike Boyle IAD Technical Lead for Standards

Trusted Computing Standards Overview Mike Boyle IAD Technical Lead for Standards

Add to Reading List

Source URL: scap.nist.gov

Language: English
52CASE STUDY:  JW Secure and the United States Department of Defense 	Introduction Our expertise in building ultra-secure systems made JW Secure the right choice

CASE STUDY: JW Secure and the United States Department of Defense Introduction Our expertise in building ultra-secure systems made JW Secure the right choice

Add to Reading List

Source URL: www.jwsecure.com

Language: English - Date: 2014-12-16 20:21:54
53Trusted Platform Module (TPM)

Trusted Platform Module (TPM)

Add to Reading List

Source URL: www.trustedcomputinggroup.org

Language: English - Date: 2009-03-28 00:28:27
54Problems with the Static Root of Trust for Measurement John Butterworth Corey Kallenberg Xeno Kovah Amy Herzog

Problems with the Static Root of Trust for Measurement John Butterworth Corey Kallenberg Xeno Kovah Amy Herzog

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2013-07-31 03:56:11
55Trusted Compute Pools Feature in oVirt Oct 22, 2013 Gang Wei,  Haitao Shan,

Trusted Compute Pools Feature in oVirt Oct 22, 2013 Gang Wei, Haitao Shan,

Add to Reading List

Source URL: www.linux-kvm.org

Language: English - Date: 2013-11-03 05:32:36
56Reconfigurable Physical Unclonable Functions – Enabling Technology for Tamper-Resistant Storage ˇ Klaus Kursawe∗ , Ahmad-Reza Sadeghi† , Dries Schellekens‡ , Boris Skori´ c§ and Pim Tuyls‡¶ ∗

Reconfigurable Physical Unclonable Functions – Enabling Technology for Tamper-Resistant Storage ˇ Klaus Kursawe∗ , Ahmad-Reza Sadeghi† , Dries Schellekens‡ , Boris Skori´ c§ and Pim Tuyls‡¶ ∗

Add to Reading List

Source URL: www.cosic.esat.kuleuven.be

Language: English
57TRUSTED TAMPERPROOF TIME ON MOBILE DEVICES  Trusted Tamperproof Time on Mobile Devices Using TPM 2.0 Services with Remote Attestation August 2, 2013

TRUSTED TAMPERPROOF TIME ON MOBILE DEVICES Trusted Tamperproof Time on Mobile Devices Using TPM 2.0 Services with Remote Attestation August 2, 2013

Add to Reading List

Source URL: www.jwsecure.com

Language: English - Date: 2014-12-16 20:21:45
58Implementation of a Trusted Ticket System Andreas Leicher1 , Nicolai Kuntze2 , and Andreas U. Schmidt3 1 Johann Wolfgang Goethe-Universität, Frankfurt am Main,Germany,

Implementation of a Trusted Ticket System Andreas Leicher1 , Nicolai Kuntze2 , and Andreas U. Schmidt3 1 Johann Wolfgang Goethe-Universität, Frankfurt am Main,Germany,

Add to Reading List

Source URL: andreas.schmidt.novalyst.de

Language: English - Date: 2009-01-06 04:23:23
59TECHNOLOGY NEWS  Will Proposed Standard Make Mobile Phones More Secure?

TECHNOLOGY NEWS Will Proposed Standard Make Mobile Phones More Secure?

Add to Reading List

Source URL: leavcom.com

Language: English - Date: 2013-04-12 14:46:43
60Analyzing trusted platform communication Klaus Kursawe, Dries Schellekens ??  ?

Analyzing trusted platform communication Klaus Kursawe, Dries Schellekens ?? ?

Add to Reading List

Source URL: www.cosic.esat.kuleuven.be

Language: English