Trusted Computing

Results: 881



#Item
841Trusted Computing / HMAC / Computer security / Cryptography / Trusted Computing Group

1 2

Add to Reading List

Source URL: www.trustedcomputinggroup.org

Language: English - Date: 2011-03-01 13:51:19
842Trusted Computing Group / Trusted Platform Module / TSS / Computer security / Trusted computing / Cryptography

TCG Specification Architecture Overview Specification

Add to Reading List

Source URL: www.trustedcomputinggroup.org

Language: English - Date: 2009-04-15 20:49:01
843Cryptography / Trusted Computing Group / Computer network security / Trusted Platform Module / Computer security / Security / Trusted computing

Trusted Computing Group Information – Version 2.0 Trusted Computing Group

Add to Reading List

Source URL: www.trustedcomputinggroup.org

Language: English - Date: 2009-03-30 19:42:38
844Microsoft Windows / Hardware-based full disk encryption / Encryption / USB flash drive / Trusted Computing Group / Backup / Cold boot attack / Trusted Computing / Password / Disk encryption / Cryptography / Computer security

Ten Reasons to Buy Self-Encrypting Drives September 2010

Add to Reading List

Source URL: www.trustedcomputinggroup.org

Language: English - Date: 2010-09-13 10:53:18
845Public-key cryptography / Key / Symmetric-key algorithm / One-time pad / Trusted Platform Module / Cryptography / Computer security / Trusted Computing

Trusted Computing IY5608: The RTM and the TPM Infrastructure Working Group Activity

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2007-02-14 11:20:25
846Trusted computing / Disk encryption / Trusted Platform Module / Cryptographic software / BitLocker Drive Encryption / Password / HMAC / SPEKE / Computer security / Cryptography / Microsoft Windows

Offline dictionary attack on TCG TPM weak authorisation data, and solution Liqun Chen

Add to Reading List

Source URL: www.cs.bham.ac.uk

Language: English - Date: 2009-02-25 10:33:23
847Windows Server / Trusted computing / Hypervisor / X86 virtualization / Hardware virtualization / Rootkit / Ring / Xen / Paravirtualization / System software / Software / Virtual machines

A Hypervisor-Based System for Protecting Software Runtime Memory and Persistent Storage Prashant Dewan↑, David Durham↑, Hormuzd Khosravi↑, Men Long↑, Gayathri Nagabhushan⊥ ↑: Communications Technology Lab, Intel Corporation; ⊥: Software Solutions Group, Intel Corporation

Add to Reading List

Source URL: vodun.org

Language: English - Date: 2008-12-16 10:36:09
848Groupware / Email / Proprietary software / MDaemon / Online chat / Instant messaging / Research In Motion / Push email / Exchange ActiveSync / Computing / Software / Computer-mediated communication

Email, Collaboration, Instant Messaging, and Mobile Device Management Trusted by SMBs Key Features

Add to Reading List

Source URL: static.altn.com

Language: English - Date: 2013-05-16 16:22:44
849Trusted computing / Programming language implementation / Hardware virtualization / Hypervisor / Hyper-V / Xen / VM / Trusted Execution Technology / Logical partition / System software / Software / Virtual machines

RC24441 (W0711-219) November 28, 2007 Computer Science

Add to Reading List

Source URL: domino.watson.ibm.com

Language: English - Date: 2007-11-30 12:58:23
850Security / Electronic commerce / Cryptographic protocols / Public-key cryptography / Direct Anonymous Attestation / Trusted Computing / Trusted Platform Module / Secure Electronic Transaction / 3-D Secure / Cryptography / Computer security / Merchant services

Noname manuscript No. (will be inserted by the editor)

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2007-12-14 13:59:43
UPDATE