Trusted Computing

Results: 881



#Item
1Practical Post-Quantum Cryptography for Trusted Computing Matthias J. Kannwischer, PhD Student Workshop on Trusted Computing and its Applications 25 January 2018

Practical Post-Quantum Cryptography for Trusted Computing Matthias J. Kannwischer, PhD Student Workshop on Trusted Computing and its Applications 25 January 2018

Add to Reading List

Source URL: kannwischer.eu

Language: English - Date: 2018-04-02 10:21:47
22016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People, and Smart World Congress Buy you

2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People, and Smart World Congress Buy you

Add to Reading List

Source URL: users.encs.concordia.ca

Language: English - Date: 2017-04-10 18:58:24
    3High Assurance Platform (HAP) High Assurance Challenges Rob Dobry Trusted Computing NSA Commercial Solutions Center

    High Assurance Platform (HAP) High Assurance Challenges Rob Dobry Trusted Computing NSA Commercial Solutions Center

    Add to Reading List

    Source URL: fm.csl.sri.com

    Language: English - Date: 2018-05-29 00:01:55
      4Thoughts about Trusted Computing Joanna Rutkowska Confidence, Krakow, Poland, May 15-16, 2009 EuSecWest, London, UK, May 27-28, 2009

      Thoughts about Trusted Computing Joanna Rutkowska Confidence, Krakow, Poland, May 15-16, 2009 EuSecWest, London, UK, May 27-28, 2009

      Add to Reading List

      Source URL: invisiblethingslab.com

      - Date: 2009-05-27 16:36:03
        5Trusted Computing  Protecting Client Privacy with Trusted Computing at the Server Current trusted-computing initiatives usually involve large

        Trusted Computing Protecting Client Privacy with Trusted Computing at the Server Current trusted-computing initiatives usually involve large

        Add to Reading List

        Source URL: cs.dartmouth.edu

        - Date: 2005-08-18 17:24:54
          6Trusted Computing Challenges Leendert van Doorn Sr. Fellow Security at Work

          Trusted Computing Challenges Leendert van Doorn Sr. Fellow Security at Work

          Add to Reading List

          Source URL: www.cs.utsa.edu

          - Date: 2007-11-12 02:02:16
            7This is the second part of HW5

            This is the second part of HW5

            Add to Reading List

            Source URL: zoo.cs.yale.edu

            Language: English - Date: 2008-11-18 08:01:23
            8Frederick M. AvolioFrederick Road Woodbine, MD5215 (mh)

            Frederick M. AvolioFrederick Road Woodbine, MD5215 (mh)

            Add to Reading List

            Source URL: www.avolio.com

            Language: English - Date: 2010-05-14 09:24:10
            9The next step in IT security after Snowden Norbert Pohlmann Institute for Internet Security - if(is), Westphalian University of Applied Sciences Gelsenkirchen Neidenburger Str. 43, 45877 Gelsenkirchen, Germany

            The next step in IT security after Snowden Norbert Pohlmann Institute for Internet Security - if(is), Westphalian University of Applied Sciences Gelsenkirchen Neidenburger Str. 43, 45877 Gelsenkirchen, Germany

            Add to Reading List

            Source URL: norbert-pohlmann.com

            Language: English - Date: 2015-12-20 08:00:14
            10Thinking About Firewalls Marcus J. Ranum  Trusted Information Systems, Inc. Glenwood, Maryland Abstract

            Thinking About Firewalls Marcus J. Ranum Trusted Information Systems, Inc. Glenwood, Maryland Abstract

            Add to Reading List

            Source URL: www.avolio.com

            Language: English - Date: 2007-12-29 17:42:39