<--- Back to Details
First PageDocument Content
Trusted computing / Espionage / Trusted Platform Module / Coprocessor / Tamper resistance / Kernel / Integrity / IBM / Secure cryptoprocessor / Computer security / Security / Cryptography
Date: 2005-08-19 15:35:31
Trusted computing
Espionage
Trusted Platform Module
Coprocessor
Tamper resistance
Kernel
Integrity
IBM
Secure cryptoprocessor
Computer security
Security
Cryptography

SECURITY Magic Boxes and Boots: Security in Hardware

Add to Reading List

Source URL: www.cs.dartmouth.edu

Download Document from Source Website

File Size: 524,22 KB

Share Document on Facebook

Similar Documents

Cryptography / Pico / Public-key cryptography / Secret sharing / RSA / Secure cryptoprocessor / Cryptographic nonce / Password

1 Am I in good company? A privacy-protecting protocol for cooperating ubiquitous computing devices Oliver Stannard and Frank Stajano

DocID: 1nrDf - View Document

Cryptography / Computer access control / Secret sharing / Pico / Authentication / Secure cryptoprocessor / Encryption / Security token / Polynomial / Public-key cryptography

Low-cost Mitigation against Cold Boot Attacks for an Authentication Token Ian Goldberg?1 , Graeme Jenkinson2 , and Frank Stajano2 1 2

DocID: 1mSPc - View Document

Trusted computing / Hardware security module / Secure cryptoprocessor / Automated teller machine / EMV / Next-Generation Secure Computing Base / Smart card / Trusted Platform Module / Security of automated teller machines / Cryptography / Computer security / Espionage

CHAPTER 18 API Attacks One is happenstance; twice is coincidence; but three times is enemy action. — Goldfinger

DocID: 19URM - View Document

Trusted computing / Espionage / Trusted Platform Module / Coprocessor / Tamper resistance / Kernel / Integrity / IBM / Secure cryptoprocessor / Computer security / Security / Cryptography

SECURITY Magic Boxes and Boots: Security in Hardware

DocID: 18QKR - View Document

Tamper resistance / Public-key cryptography / Power analysis / Encryption / Computer security / Timing attack / Password / Key size / Secure cryptoprocessor / Cryptography / Security / Espionage

Fairy dust, secrets, and the real world - Security & Privacy Magazine, IEEE

DocID: 18dmP - View Document