Back to Results
First PageMeta Content
Trusted Platform Module / Tamper resistance / Trusted Execution Technology / Next-Generation Secure Computing Base / Computer security / Cryptography / Trusted computing


Chapter 7 Introduction to the TPM
Add to Reading List

Document Date: 2010-02-08 17:06:48


Open Document

File Size: 263,46 KB

Share Result on Facebook

Company

Pearson / /

/

Facility

TPM building / University of London / /

IndustryTerm

communications interfaces / storage media / software applications / tamper proof hardware / software processes / security services / symmetric cryptographic applications / rogue applications / purpose security processors / trusted computing platforms / trusted computing / secure hardware / built-in hardware / secure computing environment / typical smart card devices / platform devices / smart card device / smart card devices / secure processing / trusted computing platform / footprint devices / /

OperatingSystem

Integrity / /

Organization

Trust for Measurement / University of London / /

Position

Major / /

Technology

encryption / main processor / smart card / private key / two technologies / operating system / RSA algorithm / purpose security processors / integrated circuit / /

URL

www.trustedcomputinggroup.org / /

SocialTag