Trusted Platform Module

Results: 234



#Item
51Trusted Computing Group / Trusted Platform Module / Standards / Standards organization / Standardization / Interoperability / Computer security / Trusted computing / Cryptography

Trusted Computing Standards Overview Mike Boyle IAD Technical Lead for Standards

Add to Reading List

Source URL: scap.nist.gov

Language: English
52System software / Microsoft SharePoint / Portal software / Active Directory Federation Services / Security Assertion Markup Language / Trusted Platform Module / Software / Computer security / Content management systems

CASE STUDY: JW Secure and the United States Department of Defense Introduction Our expertise in building ultra-secure systems made JW Secure the right choice

Add to Reading List

Source URL: www.jwsecure.com

Language: English - Date: 2014-12-16 20:21:54
53Disk encryption / Trusted Platform Module / Trusted Computing Group / Computer network security / Cryptographic software / BitLocker Drive Encryption / Trusted Network Connect / Next-Generation Secure Computing Base / Direct Anonymous Attestation / Computer security / Trusted computing / Cryptography

Trusted Platform Module (TPM)

Add to Reading List

Source URL: www.trustedcomputinggroup.org

Language: English - Date: 2009-03-28 00:28:27
54BIOS / Trusted computing / Trusted Platform Module / Trusted Execution Technology / Disk encryption / Trusted Computing Group / BitLocker Drive Encryption / Unified Extensible Firmware Interface / System Management Mode / Computer security / System software / Computing

Problems with the Static Root of Trust for Measurement John Butterworth Corey Kallenberg Xeno Kovah Amy Herzog

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2013-07-31 03:56:11
55Computing / Cloud computing / Intel vPro / Trusted computing / Trusted Execution Technology / Trusted Platform Module

Trusted Compute Pools Feature in oVirt Oct 22, 2013 Gang Wei, Haitao Shan,

Add to Reading List

Source URL: www.linux-kvm.org

Language: English - Date: 2013-11-03 05:32:36
56Randomness / PUF / Challenge-response authentication / Trusted Platform Module / Computer data storage / Smart card / Computer security / Authentication / VEST / Cryptography / Security / Physical Unclonable Function

Reconfigurable Physical Unclonable Functions – Enabling Technology for Tamper-Resistant Storage ˇ Klaus Kursawe∗ , Ahmad-Reza Sadeghi† , Dries Schellekens‡ , Boris Skori´ c§ and Pim Tuyls‡¶ ∗

Add to Reading List

Source URL: www.cosic.esat.kuleuven.be

Language: English
57Trusted Platform Module / Trusted Computing Group / Disk encryption / Unified Extensible Firmware Interface / Two-factor authentication / X.509 / Trusted Execution Technology / BitLocker Drive Encryption / Computer security / Cryptography / Trusted computing

TRUSTED TAMPERPROOF TIME ON MOBILE DEVICES Trusted Tamperproof Time on Mobile Devices Using TPM 2.0 Services with Remote Attestation August 2, 2013

Add to Reading List

Source URL: www.jwsecure.com

Language: English - Date: 2014-12-16 20:21:45
58Business law / Copyright law / Direct Anonymous Attestation / Trusted Platform Module / Kerberos / Ticket Granting Ticket / Trusted Execution Technology / Computer security / Cryptography / Trusted computing

Implementation of a Trusted Ticket System Andreas Leicher1 , Nicolai Kuntze2 , and Andreas U. Schmidt3 1 Johann Wolfgang Goethe-Universität, Frankfurt am Main,Germany,

Add to Reading List

Source URL: andreas.schmidt.novalyst.de

Language: English - Date: 2009-01-06 04:23:23
59Electronics / Trusted Platform Module / Trusted Computing Group / Mobile telecommunications / Wireless / Mobile phone / Bluetooth / Next-Generation Secure Computing Base / Trusted Execution Technology / Technology / Computer security / Trusted computing

TECHNOLOGY NEWS Will Proposed Standard Make Mobile Phones More Secure?

Add to Reading List

Source URL: leavcom.com

Language: English - Date: 2013-04-12 14:46:43
60Trusted Platform Module / Cryptography / Disk encryption / Trusted Computing Group / Low Pin Count / BitLocker Drive Encryption / Unified Extensible Firmware Interface / TPM / Lenovo ThinkCentre / Computer security / Trusted computing / Microsoft Windows

Analyzing trusted platform communication Klaus Kursawe, Dries Schellekens ?? ?

Add to Reading List

Source URL: www.cosic.esat.kuleuven.be

Language: English
UPDATE