<--- Back to Details
First PageDocument Content
Trusted computing / Hardware security module / Secure cryptoprocessor / Automated teller machine / EMV / Next-Generation Secure Computing Base / Smart card / Trusted Platform Module / Security of automated teller machines / Cryptography / Computer security / Espionage
Date: 2008-04-27 09:57:39
Trusted computing
Hardware security module
Secure cryptoprocessor
Automated teller machine
EMV
Next-Generation Secure Computing Base
Smart card
Trusted Platform Module
Security of automated teller machines
Cryptography
Computer security
Espionage

CHAPTER 18 API Attacks One is happenstance; twice is coincidence; but three times is enemy action. — Goldfinger

Add to Reading List

Source URL: www.cl.cam.ac.uk

Download Document from Source Website

File Size: 295,92 KB

Share Document on Facebook

Similar Documents

1  Am I in good company? A privacy-protecting protocol for cooperating ubiquitous computing devices Oliver Stannard and Frank Stajano

1 Am I in good company? A privacy-protecting protocol for cooperating ubiquitous computing devices Oliver Stannard and Frank Stajano

DocID: 1nrDf - View Document

Low-cost Mitigation against Cold Boot Attacks for an Authentication Token Ian Goldberg?1 , Graeme Jenkinson2 , and Frank Stajano2 1  2

Low-cost Mitigation against Cold Boot Attacks for an Authentication Token Ian Goldberg?1 , Graeme Jenkinson2 , and Frank Stajano2 1 2

DocID: 1mSPc - View Document

CHAPTER  18 API Attacks One is happenstance; twice is coincidence; but three times is enemy action. — Goldfinger

CHAPTER 18 API Attacks One is happenstance; twice is coincidence; but three times is enemy action. — Goldfinger

DocID: 19URM - View Document

SECURITY  Magic Boxes and Boots: Security in Hardware

SECURITY Magic Boxes and Boots: Security in Hardware

DocID: 18QKR - View Document

Fairy dust, secrets, and the real world - Security & Privacy Magazine, IEEE

Fairy dust, secrets, and the real world - Security & Privacy Magazine, IEEE

DocID: 18dmP - View Document