<--- Back to Details
First PageDocument Content
Cryptography / Next-Generation Secure Computing Base / Advanced Micro Devices / Trustworthy computing / Trusted Platform Module / Trusted Execution Technology / Computer security / Trusted computing / Trusted Computing Group
Date: 2006-10-26 13:04:44
Cryptography
Next-Generation Secure Computing Base
Advanced Micro Devices
Trustworthy computing
Trusted Platform Module
Trusted Execution Technology
Computer security
Trusted computing
Trusted Computing Group

AMD’s Vision for Trustworthy Computing

Add to Reading List

Source URL: www.ic.unicamp.br

Download Document from Source Website

File Size: 87,36 KB

Share Document on Facebook

Similar Documents

Attacking Intel® Trusted Execution Technology Rafal Wojtczuk Joanna Rutkowska

DocID: 1tWKg - View Document

Computing / Computer security / Computer networking / Trusted computing / Computer network security / Cyberwarfare / Data security / Firewall / Trusted Execution Technology / Network address translation / Trusted Platform Module / Packet processing

ETTM: A Scalable Fault Tolerant Network Manager Colin Dixon Hardeep Uppal Vjekoslav Brajkovic Dane Brandon Thomas Anderson Arvind Krishnamurthy University of Washington Abstract In this paper, we design, implement, and e

DocID: 1qxEz - View Document

Computing / Software engineering / Computer security / Cryptography / Trusted computing / Smart cards / Trusted Platform Module / Closure / Variable / Java Card / Subroutine / Trusted Execution Technology

The Trusted Execution Module: Commodity General-Purpose Trusted Computing Victor Costan, Luis F. G. Sarmenta, Marten van Dijk, and Srinivas Devadas MIT Computer Science and Artificial Intelligence Laboratory, Cambridge,

DocID: 1qwoE - View Document

Disk encryption / Trusted computing / Trusted Platform Module / Cryptography / Windows Vista / Trusted Computing Group / BitLocker / Cloud computing / Cloud storage / Trusted Execution Technology

cTPM: A Cloud TPM for Cross-Device Trusted Applications Chen Chen† , Himanshu Raj, Stefan Saroiu, and Alec Wolman Microsoft Research and † CMU Current Trusted Platform Modules (TPMs) are illsuited for use in mobile s

DocID: 1pqzt - View Document

Computer architecture / Computer security / System software / Trusted computing / Operating system kernels / Boot loaders / Cryptographic software / Trusted Platform Module / Trusted Execution Technology / Trusted Computing Group / Loadable kernel module / Loader

Analysis of a Measured Launch

DocID: 1nJ8R - View Document