First Page | Document Content | |
---|---|---|
Date: 2005-08-19 15:35:31Trusted computing Espionage Trusted Platform Module Coprocessor Tamper resistance Kernel Integrity IBM Secure cryptoprocessor Computer security Security Cryptography | SECURITY Magic Boxes and Boots: Security in HardwareAdd to Reading ListSource URL: www.cs.dartmouth.eduDownload Document from Source WebsiteFile Size: 524,22 KBShare Document on Facebook |
1 Am I in good company? A privacy-protecting protocol for cooperating ubiquitous computing devices Oliver Stannard and Frank StajanoDocID: 1nrDf - View Document | |
Low-cost Mitigation against Cold Boot Attacks for an Authentication Token Ian Goldberg?1 , Graeme Jenkinson2 , and Frank Stajano2 1 2DocID: 1mSPc - View Document | |
CHAPTER 18 API Attacks One is happenstance; twice is coincidence; but three times is enemy action. — GoldfingerDocID: 19URM - View Document | |
SECURITY Magic Boxes and Boots: Security in HardwareDocID: 18QKR - View Document | |
Fairy dust, secrets, and the real world - Security & Privacy Magazine, IEEEDocID: 18dmP - View Document |