Trusted Computing

Results: 881



#Item
871Trusted Platform Module / Trusted Computing / Zero-knowledge proof / Digital signature / Group signature / Cryptography / Computer security / Direct Anonymous Attestation

PDF Document

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-08-20 04:21:10
872Computer-mediated communication / Trusted computing base / Mandatory access control / Email filtering / Simple Mail Transfer Protocol / Email / Computer security / Computing

PDF Document

Add to Reading List

Source URL: www.cryptosmith.com

Language: English - Date: 2011-03-19 12:01:40
873Computer network security / Crime prevention / National security / Multilevel security / Information security / Mandatory access control / Trusted Computer System Evaluation Criteria / Security token / Ring / Computer security / Security / Computing

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 1998-10-28 00:00:00
874Trusted Network Connect / Trusted Computing Group / Trusted Platform Module / Computer security / Trusted computing / Computer network security

PDF Document

Add to Reading List

Source URL: www.opus1.com

Language: English - Date: 2008-04-28 05:02:05
875X86 architecture / Out-of-band management / Intel vPro / Intel Core / Intel Active Management Technology / Intel / Trusted Execution Technology / Hyper-threading / Multi-core processor / Computing / Computer hardware / System software

PDF Document

Add to Reading List

Source URL: download.intel.com

Language: English - Date: 2009-12-29 16:38:10
876PCI configuration space / Conventional PCI / Intel QuickPath Interconnect / PCI Express / Intel / Trusted Execution Technology / X86 virtualization / Intel X58 / Itanium / Computer hardware / Computer buses / Computing

PDF Document

Add to Reading List

Source URL: download.intel.com

Language: English - Date: 2009-09-04 15:04:59
877Security / Privacy / Computer network security / National Strategy for Trusted Identities in Cyberspace / Internet governance / Standards organizations / Federated identity management / Kantara Initiative / Identity Commons / Computing / Identity management / Ethics

PDF Document

Add to Reading List

Source URL: openidentityexchange.org

Language: English - Date: 2013-07-16 14:21:29
878Disk encryption / Trusted Platform Module / Trusted Computing Group / Booting / Initrd / Trusted Execution Technology / Next-Generation Secure Computing Base / Computer security / Trusted computing / Cryptography

PDF Document

Add to Reading List

Source URL: elinux.org

Language: English - Date: 2012-11-01 14:36:29
879Trusted Platform Module / Trusted computing base / Ring / Public key infrastructure / Computing / Trustworthy computing / Computer security / Trusted computing / Next-Generation Secure Computing Base

PDF Document

Add to Reading List

Source URL: liedra.net

Language: English - Date: 2011-01-29 07:16:34
880Computer architecture / Preboot Execution Environment / Booting / Authorization certificate / Unified Extensible Firmware Interface / Trusted Platform Module / BIOS / Computing / System software

PDF Document

Add to Reading List

Source URL: download.intel.com

Language: English - Date: 2006-03-28 18:43:35
UPDATE