Trusted Platform Module

Results: 234



#Item
1

Towards Verified C specification for TPM API Aybek Mukhamedov, Andy Gordon and Mark Ryan Trusted Platform Module

Add to Reading List

Source URL: www.cs.bham.ac.uk

Language: English - Date: 2010-03-26 11:31:43
    2

    Towards a Verified Reference Implementation of a Trusted Platform Module Aybek Mukhamedov1,2 , Andrew D. Gordon1 , and Mark Ryan2 1 2

    Add to Reading List

    Source URL: www.cs.bham.ac.uk

    Language: English - Date: 2010-04-20 09:53:15
      3

      Trusted Platform Module (TPM) Element Manager

      Add to Reading List

      Source URL: netcom.army.mil

      - Date: 2009-10-26 18:31:18
        4Computer security / Cryptography / Computing / Security / Trusted Platform Module / Data in use / Embedded system / Physical unclonable function / Trusted Computing / Software / Operating system / Key management

        Secure Embedded Systems Michael Vai, David J. Whelihan, Benjamin R. Nahill, Daniil M. Utin, Sean R. O’Melia, and Roger I. Khazan Developers seek to seamlessly integrate cyber

        Add to Reading List

        Source URL: www.ll.mit.edu

        Language: English - Date: 2016-07-12 15:07:52
        5Computing / Computer security / Computer networking / Trusted computing / Computer network security / Cyberwarfare / Data security / Firewall / Trusted Execution Technology / Network address translation / Trusted Platform Module / Packet processing

        ETTM: A Scalable Fault Tolerant Network Manager Colin Dixon Hardeep Uppal Vjekoslav Brajkovic Dane Brandon Thomas Anderson Arvind Krishnamurthy University of Washington Abstract In this paper, we design, implement, and e

        Add to Reading List

        Source URL: colindixon.com

        Language: English - Date: 2012-04-28 16:29:27
        6Computing / Software engineering / Computer security / Cryptography / Trusted computing / Smart cards / Trusted Platform Module / Closure / Variable / Java Card / Subroutine / Trusted Execution Technology

        The Trusted Execution Module: Commodity General-Purpose Trusted Computing Victor Costan, Luis F. G. Sarmenta, Marten van Dijk, and Srinivas Devadas MIT Computer Science and Artificial Intelligence Laboratory, Cambridge,

        Add to Reading List

        Source URL: people.csail.mit.edu

        Language: English - Date: 2008-06-16 20:15:44
        7Computer security / Security / Prevention / Computer access control / Pre-boot authentication / USB flash drive / Authentication / Trusted Platform Module / Password / Acer N50 / Disk encryption

        Acer ProShield The Acer ProShield suite of essential security and manageability tools allows you to manage your security applications. Create encrypted personal secure drives and add extra layers of protection to keep yo

        Add to Reading List

        Source URL: static.acer.com

        Language: English - Date: 2013-10-24 05:13:45
        8Cryptography / Computer security / Logger / Data / Logfile / Public-key cryptography / Log analysis / Trusted computing / Disk encryption / Trusted Platform Module

        Continuous Tamper-proof Logging Using TPM 2.0 Arunesh Sinha1 , Limin Jia1 , Paul England2 , and Jacob R. Lorch2 1 Carnegie Mellon University, Pittsburgh, Pennsylvania, USA

        Add to Reading List

        Source URL: www.andrew.cmu.edu

        Language: English - Date: 2016-01-24 20:37:43
        9Hashing / Logger / Data logger / Data / Logfile / Hash-based message authentication code / Computer security / Information science / Information retrieval / Cryptography / Trusted computing / Trusted Platform Module

        Continuous Tamper-proof Logging using TPM2.0 Paul England, Limin Jia, James Lorch, and Arunesh Sinha July 9, 2013 (Revised June 16, 2014)

        Add to Reading List

        Source URL: www.andrew.cmu.edu

        Language: English - Date: 2016-01-24 20:37:43
        10Disk encryption / Trusted computing / Trusted Platform Module / Cryptography / Windows Vista / Trusted Computing Group / BitLocker / Cloud computing / Cloud storage / Trusted Execution Technology

        cTPM: A Cloud TPM for Cross-Device Trusted Applications Chen Chen† , Himanshu Raj, Stefan Saroiu, and Alec Wolman Microsoft Research and † CMU Current Trusted Platform Modules (TPMs) are illsuited for use in mobile s

        Add to Reading List

        Source URL: www.netsec.ethz.ch

        Language: English - Date: 2015-06-01 09:06:12
        UPDATE