G-module

Results: 235



#Item
181Trusted computing / Smart cards / Public-key cryptography / Closure / Subroutines / Trusted Platform Module / Variable / Java Card / Trusted Execution Technology / Cryptography / Computer security / Computing

The Trusted Execution Module: Commodity General-Purpose Trusted Computing Victor Costan, Luis F. G. Sarmenta, Marten van Dijk, and Srinivas Devadas MIT Computer Science and Artificial Intelligence Laboratory, Cambridge,

Add to Reading List

Source URL: projects.csail.mit.edu

Language: English - Date: 2008-09-09 21:32:55
182Surveillance / Law enforcement / Law / Police / KWL table / National security / Security / Crime prevention

POLI C I N G & S O C IE T Y 65 Module 6

Add to Reading List

Source URL: www.ojen.ca

Language: English - Date: 2013-06-27 10:29:38
183Crime prevention / Law enforcement / Criminal law / Discretion / Police / Law / Security / National security

POLI C I N G & S O C IE T Y 23 Module 2

Add to Reading List

Source URL: www.ojen.ca

Language: English - Date: 2013-07-22 13:51:21
184Error detection and correction / Cryptography / Cryptographic hash functions / Trusted Platform Module / Trusted Computing Group / Trusted Execution Technology / Next-Generation Secure Computing Base / Counter / Hash tree / Computer security / Trusted computing / Hashing

Virtual Monotonic Counters and Count-Limited Objects using a TPM without a Trusted OS ∗ Luis F. G. Sarmenta, Marten van Dijk, Charles W. O’Donnell, Jonathan Rhodes, and Srinivas Devadas

Add to Reading List

Source URL: projects.csail.mit.edu

Language: English - Date: 2006-08-31 18:21:40
185Evaluation methods / Teaching / Formative assessment / E-learning / Lesson / Education / Educational psychology / Evaluation

CONCEPTUAL FLOW GRAPHIC APPROACH FOR STEM-IT 1. Label a large piece of chart paper with the name of the module and publisher. Also add, at the bottom of the CFG, the names of the teachers who are working on this visual g

Add to Reading List

Source URL: www.stem-it.org

Language: English - Date: 2012-09-24 22:01:05
186Statistics / Evaluation methods / Market research / Psychometrics / Marketing / Survey methodology / Questionnaire / International Space Station / Decision making / Spaceflight / Science / Research methods

MODULE G. WOMEN’S EMPOWERMENT IN AGRICULTURE INDEX NOTE: The information in Module G1 can be captured in different ways; however there must be a way to a) identify the proper individual within the household to be asked

Add to Reading List

Source URL: agrilinks.org

Language: English - Date: 2012-11-19 00:00:00
187Evaluation methods / Teaching / Formative assessment / E-learning / Lesson / Education / Educational psychology / Evaluation

CONCEPTUAL FLOW GRAPHIC APPROACH FOR STEM-IT 1. Label a large piece of chart paper with the name of the module and publisher. Also add, at the bottom of the CFG, the names of the teachers who are working on this visual g

Add to Reading List

Source URL: www.stem-it.org

Language: English - Date: 2012-10-01 00:39:19
188

3 MODULE Résumé S U I V I D E S A L L É G AT I O N S E T S O U P Ç O N S

Add to Reading List

Source URL: www.mtc.gov.on.ca

Language: French - Date: 2013-05-15 12:42:40
    189Trusted computing / Cryptography / File sharing networks / Internet privacy / Direct Anonymous Attestation / Peer-to-peer computing / Trusted Platform Module / Peer-to-peer / Social peer-to-peer processes / Computer security / Computing / Concurrent computing

    Trusted Computing: Providing Security for Peer-to-Peer Networks Shane Balfe, Amit D. Lakhani and Kenneth G. Paterson, Information Security Group, Royal Holloway, University of London, United Kingdom. {S.Balfe,Amit.Lakhan

    Add to Reading List

    Source URL: www.isg.rhul.ac.uk

    Language: English - Date: 2005-06-23 08:33:02
    190Module / Modularity

    TECHNICAL REPORT IGE–294 A USER GUIDE FOR DRAGON VERSION4 G. Marleau, A. H´

    Add to Reading List

    Source URL: www.polymtl.ca

    Language: English - Date: 2014-09-02 14:38:21
    UPDATE