Trusted computing

Results: 881



#Item
81Trusted Platform Module / Trusted Computing Group / Advanced Micro Devices / Intel / Computer security / Trusted computing / Cryptography

Trusted Platform Module Library Part 1: Architecture Family “2.0” Level 00 RevisionOctober 30, 2014

Add to Reading List

Source URL: www.trustedcomputinggroup.org

Language: English - Date: 2014-11-07 17:19:25
82Copyright law / Cryptography / Trusted Computing / Database / Computer security / Cloud computing / Security / Computing / Business law

Poster: Forcing the Cloud to Forget by Attesting Data Deletion Michael Backes Fabian Bendun

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2015-05-11 16:42:40
83Computing / Protection Profile / Key management / Public-key cryptography / Common Criteria / Electronic signature / Evaluation Assurance Level / Public key certificate / Integrity / Computer security / Evaluation / Security

Protection profiles for secure signature creation device — Part 6: Extension for device with key import and trusted communication with signature creation application

Add to Reading List

Source URL: sogis.eu

Language: English - Date: 2014-02-14 05:40:12
84Business / Auction / Secure multi-party computation / Trusted third party / Universal composability / Vickrey auction / Online auction business model / Bid / Cryptography / Auction theory / Auctioneering / Cryptographic protocols

BRICS RSBogetoft et al.: Secure Computing, Economy, and Trust: A Generic Solution for Secure Auctions BRICS Basic Research in Computer Science

Add to Reading List

Source URL: www.brics.dk

Language: English - Date: 2005-06-06 07:42:15
85

Solving the Data Security Dilemma with Self-Encrypting Drives May 2010 Trusted Computing Group 3855 SW 153rd Drive, Beaverton, OR 97006

Add to Reading List

Source URL: www.trustedcomputinggroup.org

Language: English - Date: 2010-05-19 15:06:35
    86

    BYLAWS OF TRUSTED COMPUTING GROUP (An Oregon Nonprofit Corporation) Adopted 26 Feb 2003 As Amended through JulyARTICLE 1: DEFINITIONS

    Add to Reading List

    Source URL: www.trustedcomputinggroup.org

    - Date: 2012-07-26 13:53:17
      87

      Trusted Computing for Trusted Provenance

      Add to Reading List

      Source URL: www.nesc.ac.uk

      Language: English - Date: 2009-05-13 03:57:59
        88

        The National Security Agency invites you to attend The 2nd Annual NSA Trusted Computing Conference and Exposition September 20-22, 2011 Orlando, Florida The theme for the year’s event is “Using COTS Technologies to D

        Add to Reading List

        Source URL: www.nsa.gov

        Language: English - Date: 2011-07-08 09:43:11
          89

          Sancus: Low-cost trustworthy extensible networked devices with a zero-software Trusted Computing Base Job Noorman Anthony Van Herrewege Pieter Agten

          Add to Reading List

          Source URL: lirias.kuleuven.be

          Language: English
            90

            2002 Paper 8 Question 6 Security (a) Explain the concept of a Trusted Computing Base and outline its meaning in the context of the access control provided by a typical Unix workstation. [5 marks]

            Add to Reading List

            Source URL: www.cl.cam.ac.uk

            Language: English - Date: 2014-06-09 10:17:49
              UPDATE