<--- Back to Details
First PageDocument Content
Trusted computing / Key management / Trusted Platform Module / Cryptographic software / Trusted Computing Group / BitLocker Drive Encryption / Key size / Key / Crypt / Cryptography / Computer security / Disk encryption
Date: 2013-09-26 17:29:37
Trusted computing
Key management
Trusted Platform Module
Cryptographic software
Trusted Computing Group
BitLocker Drive Encryption
Key size
Key
Crypt
Cryptography
Computer security
Disk encryption

Tech Digest Figure Template_1.5 column_01-06-12

Add to Reading List

Source URL: techdigest.jhuapl.edu

Download Document from Source Website

File Size: 727,24 KB

Share Document on Facebook

Similar Documents

Cryptography / Public-key cryptography / Public key infrastructure / Key management / E-commerce / Group signature / Trusted Computing / Certificate authority / Anonymity / Digital signature / Public key certificate / Direct Anonymous Attestation

figures/spendorsementRATE.eps

DocID: 1pOQH - View Document

Disk encryption / Trusted computing / Trusted Platform Module / Cryptography / Windows Vista / Trusted Computing Group / BitLocker / Cloud computing / Cloud storage / Trusted Execution Technology

cTPM: A Cloud TPM for Cross-Device Trusted Applications Chen Chen† , Himanshu Raj, Stefan Saroiu, and Alec Wolman Microsoft Research and † CMU Current Trusted Platform Modules (TPMs) are illsuited for use in mobile s

DocID: 1pqzt - View Document

Cryptography / Computer security / Microsoft Windows / Cryptographic software / Trusted computing / Disk encryption / Windows Vista / Trusted Platform Module / BitLocker / Unified Extensible Firmware Interface / Booting / Trusted Computing Group

Advanced  x86:   BIOS  and  System  Management  Mode  Internals   Trusted  Compu-ng  Technologies   Xeno  Kovah  &&  Corey  Kallenberg   LegbaCore,  LLC  

DocID: 1nOjG - View Document

Computer architecture / Computer security / System software / Trusted computing / Operating system kernels / Boot loaders / Cryptographic software / Trusted Platform Module / Trusted Execution Technology / Trusted Computing Group / Loadable kernel module / Loader

Analysis of a Measured Launch

DocID: 1nJ8R - View Document

Computer security / Computing / Trusted computing / Cryptography / Windows Vista / Trusted Computing Group / Next-Generation Secure Computing Base / Grid computing / Proxy server / Rootkit / Virtualization / Hardware virtualization

information security technical report–138 available at www.sciencedirect.com www.compseconline.com/publications/prodinf.htm

DocID: 1mRxb - View Document