Trusted Platform Module

Results: 234



#Item
1Towards Verified C specification for TPM API Aybek Mukhamedov, Andy Gordon and Mark Ryan  Trusted Platform Module

Towards Verified C specification for TPM API Aybek Mukhamedov, Andy Gordon and Mark Ryan Trusted Platform Module

Add to Reading List

Source URL: www.cs.bham.ac.uk

Language: English - Date: 2010-03-26 11:31:43
    2Towards a Verified Reference Implementation of a Trusted Platform Module Aybek Mukhamedov1,2 , Andrew D. Gordon1 , and Mark Ryan2 1  2

    Towards a Verified Reference Implementation of a Trusted Platform Module Aybek Mukhamedov1,2 , Andrew D. Gordon1 , and Mark Ryan2 1 2

    Add to Reading List

    Source URL: www.cs.bham.ac.uk

    Language: English - Date: 2010-04-20 09:53:15
      3

      Trusted Platform Module (TPM) Element Manager

      Add to Reading List

      Source URL: netcom.army.mil

      - Date: 2009-10-26 18:31:18
        4Secure Embedded Systems Michael Vai, David J. Whelihan, Benjamin R. Nahill, Daniil M. Utin, Sean R. O’Melia, and Roger I. Khazan  Developers seek to seamlessly integrate cyber

        Secure Embedded Systems Michael Vai, David J. Whelihan, Benjamin R. Nahill, Daniil M. Utin, Sean R. O’Melia, and Roger I. Khazan Developers seek to seamlessly integrate cyber

        Add to Reading List

        Source URL: www.ll.mit.edu

        Language: English - Date: 2016-07-12 15:07:52
        5ETTM: A Scalable Fault Tolerant Network Manager Colin Dixon Hardeep Uppal Vjekoslav Brajkovic Dane Brandon Thomas Anderson Arvind Krishnamurthy University of Washington Abstract In this paper, we design, implement, and e

        ETTM: A Scalable Fault Tolerant Network Manager Colin Dixon Hardeep Uppal Vjekoslav Brajkovic Dane Brandon Thomas Anderson Arvind Krishnamurthy University of Washington Abstract In this paper, we design, implement, and e

        Add to Reading List

        Source URL: colindixon.com

        Language: English - Date: 2012-04-28 16:29:27
        6The Trusted Execution Module: Commodity General-Purpose Trusted Computing Victor Costan, Luis F. G. Sarmenta, Marten van Dijk, and Srinivas Devadas MIT Computer Science and Artificial Intelligence Laboratory, Cambridge,

        The Trusted Execution Module: Commodity General-Purpose Trusted Computing Victor Costan, Luis F. G. Sarmenta, Marten van Dijk, and Srinivas Devadas MIT Computer Science and Artificial Intelligence Laboratory, Cambridge,

        Add to Reading List

        Source URL: people.csail.mit.edu

        Language: English - Date: 2008-06-16 20:15:44
        7Acer ProShield The Acer ProShield suite of essential security and manageability tools allows you to manage your security applications. Create encrypted personal secure drives and add extra layers of protection to keep yo

        Acer ProShield The Acer ProShield suite of essential security and manageability tools allows you to manage your security applications. Create encrypted personal secure drives and add extra layers of protection to keep yo

        Add to Reading List

        Source URL: static.acer.com

        Language: English - Date: 2013-10-24 05:13:45
        8Continuous Tamper-proof Logging Using TPM 2.0 Arunesh Sinha1 , Limin Jia1 , Paul England2 , and Jacob R. Lorch2 1  Carnegie Mellon University, Pittsburgh, Pennsylvania, USA

        Continuous Tamper-proof Logging Using TPM 2.0 Arunesh Sinha1 , Limin Jia1 , Paul England2 , and Jacob R. Lorch2 1 Carnegie Mellon University, Pittsburgh, Pennsylvania, USA

        Add to Reading List

        Source URL: www.andrew.cmu.edu

        Language: English - Date: 2016-01-24 20:37:43
        9Continuous Tamper-proof Logging using TPM2.0 Paul England, Limin Jia, James Lorch, and Arunesh Sinha July 9, 2013 (Revised June 16, 2014)

        Continuous Tamper-proof Logging using TPM2.0 Paul England, Limin Jia, James Lorch, and Arunesh Sinha July 9, 2013 (Revised June 16, 2014)

        Add to Reading List

        Source URL: www.andrew.cmu.edu

        Language: English - Date: 2016-01-24 20:37:43
        10cTPM: A Cloud TPM for Cross-Device Trusted Applications Chen Chen† , Himanshu Raj, Stefan Saroiu, and Alec Wolman Microsoft Research and † CMU Current Trusted Platform Modules (TPMs) are illsuited for use in mobile s

        cTPM: A Cloud TPM for Cross-Device Trusted Applications Chen Chen† , Himanshu Raj, Stefan Saroiu, and Alec Wolman Microsoft Research and † CMU Current Trusted Platform Modules (TPMs) are illsuited for use in mobile s

        Add to Reading List

        Source URL: www.netsec.ethz.ch

        Language: English - Date: 2015-06-01 09:06:12