<--- Back to Details
First PageDocument Content
Trusted computing / Espionage / Trusted Platform Module / Coprocessor / Tamper resistance / Kernel / Integrity / IBM / Secure cryptoprocessor / Computer security / Security / Cryptography
Date: 2005-08-19 15:35:31
Trusted computing
Espionage
Trusted Platform Module
Coprocessor
Tamper resistance
Kernel
Integrity
IBM
Secure cryptoprocessor
Computer security
Security
Cryptography

SECURITY Magic Boxes and Boots: Security in Hardware

Add to Reading List

Source URL: www.cs.dartmouth.edu

Download Document from Source Website

File Size: 524,22 KB

Share Document on Facebook

Similar Documents

Towards Verified C specification for TPM API Aybek Mukhamedov, Andy Gordon and Mark Ryan  Trusted Platform Module

Towards Verified C specification for TPM API Aybek Mukhamedov, Andy Gordon and Mark Ryan Trusted Platform Module

DocID: 1uVol - View Document

Towards a Verified Reference Implementation of a Trusted Platform Module Aybek Mukhamedov1,2 , Andrew D. Gordon1 , and Mark Ryan2 1  2

Towards a Verified Reference Implementation of a Trusted Platform Module Aybek Mukhamedov1,2 , Andrew D. Gordon1 , and Mark Ryan2 1 2

DocID: 1uKjY - View Document

Trusted Platform Module (TPM) Element Manager

DocID: 1sxEG - View Document

Secure Embedded Systems Michael Vai, David J. Whelihan, Benjamin R. Nahill, Daniil M. Utin, Sean R. O’Melia, and Roger I. Khazan  Developers seek to seamlessly integrate cyber

Secure Embedded Systems Michael Vai, David J. Whelihan, Benjamin R. Nahill, Daniil M. Utin, Sean R. O’Melia, and Roger I. Khazan Developers seek to seamlessly integrate cyber

DocID: 1qIlJ - View Document

ETTM: A Scalable Fault Tolerant Network Manager Colin Dixon Hardeep Uppal Vjekoslav Brajkovic Dane Brandon Thomas Anderson Arvind Krishnamurthy University of Washington Abstract In this paper, we design, implement, and e

ETTM: A Scalable Fault Tolerant Network Manager Colin Dixon Hardeep Uppal Vjekoslav Brajkovic Dane Brandon Thomas Anderson Arvind Krishnamurthy University of Washington Abstract In this paper, we design, implement, and e

DocID: 1qxEz - View Document