Trusted Computing

Results: 881



#Item
1Cryptography / Post-quantum cryptography / Trusted Computing / Public-key cryptography / Quantum cryptography / Key size / Advanced Encryption Standard process

Practical Post-Quantum Cryptography for Trusted Computing Matthias J. Kannwischer, PhD Student Workshop on Trusted Computing and its Applications 25 January 2018

Add to Reading List

Source URL: kannwischer.eu

Language: English - Date: 2018-04-02 10:21:47
2

2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People, and Smart World Congress Buy you

Add to Reading List

Source URL: users.encs.concordia.ca

Language: English - Date: 2017-04-10 18:58:24
    3

    High Assurance Platform (HAP) High Assurance Challenges Rob Dobry Trusted Computing NSA Commercial Solutions Center

    Add to Reading List

    Source URL: fm.csl.sri.com

    Language: English - Date: 2018-05-29 00:01:55
      4

      Thoughts about Trusted Computing Joanna Rutkowska Confidence, Krakow, Poland, May 15-16, 2009 EuSecWest, London, UK, May 27-28, 2009

      Add to Reading List

      Source URL: invisiblethingslab.com

      - Date: 2009-05-27 16:36:03
        5

        Trusted Computing Protecting Client Privacy with Trusted Computing at the Server Current trusted-computing initiatives usually involve large

        Add to Reading List

        Source URL: cs.dartmouth.edu

        - Date: 2005-08-18 17:24:54
          6

          Trusted Computing Challenges Leendert van Doorn Sr. Fellow Security at Work

          Add to Reading List

          Source URL: www.cs.utsa.edu

          - Date: 2007-11-12 02:02:16
            7Computer security / Law / Cryptography / Human rights / Business law / Copyright law / Trusted Computing / Health Insurance Portability and Accountability Act / Privacy / Medical privacy / Trusted system / Internet privacy

            This is the second part of HW5

            Add to Reading List

            Source URL: zoo.cs.yale.edu

            Language: English - Date: 2008-11-18 08:01:23
            8Computing / Computer security / Software engineering / Computer network security / Cyberwarfare / Data security / Firewall / Network management / Trusted Information Systems / APL / Guard / Malware

            Frederick M. AvolioFrederick Road Woodbine, MD5215 (mh)

            Add to Reading List

            Source URL: www.avolio.com

            Language: English - Date: 2010-05-14 09:24:10
            9Computer security / Cyberwarfare / Security / Cryptography / Antivirus software / Computer network security / Secure communication / Malware / Internet security / Vulnerability / Computer virus / Trusted computing base

            The next step in IT security after Snowden Norbert Pohlmann Institute for Internet Security - if(is), Westphalian University of Applied Sciences Gelsenkirchen Neidenburger Str. 43, 45877 Gelsenkirchen, Germany

            Add to Reading List

            Source URL: norbert-pohlmann.com

            Language: English - Date: 2015-12-20 08:00:14
            10Computer network security / Computing / Computer security / Cyberwarfare / Bastion host / Firewall / Dual-homed / Router / Guard / Subnetwork / Gateway / Distributed firewall

            Thinking About Firewalls Marcus J. Ranum Trusted Information Systems, Inc. Glenwood, Maryland Abstract

            Add to Reading List

            Source URL: www.avolio.com

            Language: English - Date: 2007-12-29 17:42:39
            UPDATE