Trusted Computing

Results: 881



#Item
71

Proceedings of the 5th IEEE Systems, Man and Cybernetics Information Assurance Workshop, United States Military Academy, West Point, NY, 10–11 June 2004, ppThe Trusted Computing Exemplar Project Cynthia E. Ir

Add to Reading List

Source URL: www.cisr.us

Language: English - Date: 2007-11-15 12:21:11
    72

    Proceedings of the 5th IEEE Systems, Man and Cybernetics Information Assurance Workshop, United States Military Academy, West Point, NY, 10–11 June 2004, ppThe Trusted Computing Exemplar Project Cynthia E. Ir

    Add to Reading List

    Source URL: www.cisr.us

    Language: English - Date: 2007-11-15 12:21:11
      73Computer security / Trusted computing / Windows Vista / Cryptography / Trusted Platform Module / Key management / Volume license key

      KISS: “Key it Simple and Secure” Corporate Key Management Zongwei Zhou, Jun Han, Yue-Hsun Lin, Adrian Perrig, Virgil Gligor CyLab and Carnegie Mellon University, Pittsburgh, Pennsylvania, United States {stephenzhou,

      Add to Reading List

      Source URL: www.netsec.ethz.ch

      Language: English - Date: 2015-06-01 09:06:14
      74Software / System software / Computing / Trusted computing / Hypervisor / Protection ring / Trusted Platform Module / Xen / Kernel / Thread

      MiniBox: A Two-Way Sandbox for x86 Native Code Yanlin Li, Adrian Perrig, Jonathan McCune, James Newsome, Brandon Baker, Will Drewry February 21, 2014 CMU-CyLab

      Add to Reading List

      Source URL: www.netsec.ethz.ch

      Language: English - Date: 2015-06-01 09:06:11
      75

      TSAFE: Building a Trusted Computing Base for Air Traffic Control Software by Gregory D. Dennis Bachelor of Science in Computer Science and Engineering

      Add to Reading List

      Source URL: sdg.csail.mit.edu

      Language: English - Date: 2014-05-07 00:00:59
        76

        Privacy For RFID Through Trusted Computing David Molnar∗ Andrea Soppera† ABSTRACT

        Add to Reading List

        Source URL: www.dmolnar.com

        Language: English - Date: 2009-08-16 02:42:20
          77

          Semantic Remote Attestation: A Virtual Machine Directed Approach to Trusted Computing Vivek Haldar Deepak Chandra Michael Franz

          Add to Reading List

          Source URL: www.vivekhaldar.com

          Language: English - Date: 2005-12-09 20:49:49
            78Cyberwarfare / Trusted computing / Crime prevention / National security / Trusted Platform Module / IF-MAP / Trusted Computing Group / Trusted Network Connect / Network security / Computer security / Security / Computer network security

            ARCHITECT’S GUIDE: CYBERSECURITY October 2013 Trusted Computing Group 3855 SW 153rd Drive Beaverton, OR 97006

            Add to Reading List

            Source URL: www.trustedcomputinggroup.org

            Language: English - Date: 2013-12-06 18:21:27
            79Security / Trusted Network Connect / Trusted Platform Module / Cloud computing / Infrastructure / Computer security / Trusted computing / Computer network security

            PDF Document

            Add to Reading List

            Source URL: www.trustedcomputinggroup.org

            Language: English - Date: 2010-09-13 09:37:20
            80

            ARCHITECT’S GUIDE: ICS SECURITY USING TNC TECHNOLOGY October 2013 Trusted Computing Group 3855 SW 153rd Drive Beaverton, OR 97006

            Add to Reading List

            Source URL: www.trustedcomputinggroup.org

            Language: English - Date: 2013-11-06 16:49:30
              UPDATE