Trusted computing

Results: 881



#Item
61Trusted Computing Exemplar (TCX) Project Objective Provide a working example showing how trusted computing systems and components can be constructed to meet high assurance evaluation criteria. Reference implementation co

Trusted Computing Exemplar (TCX) Project Objective Provide a working example showing how trusted computing systems and components can be constructed to meet high assurance evaluation criteria. Reference implementation co

Add to Reading List

Source URL: www.cisr.us

Language: English - Date: 2007-11-15 12:21:22
    62Microsoft Word - SystemSpecCompliance.doc

    Microsoft Word - SystemSpecCompliance.doc

    Add to Reading List

    Source URL: www.globalplatform.org

    Language: English - Date: 2011-02-25 21:08:34
    63A Trusted UI for the Mobile Web Bastian Braun1 , Johannes Koestler1 , Joachim Posegga1 , and Martin Johns2 1 Institute of IT Security and Security Law (ISL), University of Passau, Germany 2

    A Trusted UI for the Mobile Web Bastian Braun1 , Johannes Koestler1 , Joachim Posegga1 , and Martin Johns2 1 Institute of IT Security and Security Law (ISL), University of Passau, Germany 2

    Add to Reading List

    Source URL: dl.dropboxusercontent.com

    Language: English
    64Appeared in the 23rd Annual IFIP WG 11.3 Working Conference on Data and Application Security, 2009, pp. 252–267.  Improving Cut-and-Choose in Verifiable Encryption and Fair Exchange Protocols using Trusted Computing Te

    Appeared in the 23rd Annual IFIP WG 11.3 Working Conference on Data and Application Security, 2009, pp. 252–267. Improving Cut-and-Choose in Verifiable Encryption and Fair Exchange Protocols using Trusted Computing Te

    Add to Reading List

    Source URL: www.uncg.edu

    Language: English - Date: 2009-10-01 15:00:03
      65Market-driven Code Provisioning to Mobile Secure Hardware Alexandra Dmitrienko2 , Stephan Heuser1 , Thien Duc Nguyen1 , Marcos da Silva Ramos2 , Andre Rein2 , and Ahmad-Reza Sadeghi1 1

      Market-driven Code Provisioning to Mobile Secure Hardware Alexandra Dmitrienko2 , Stephan Heuser1 , Thien Duc Nguyen1 , Marcos da Silva Ramos2 , Andre Rein2 , and Ahmad-Reza Sadeghi1 1

      Add to Reading List

      Source URL: www.trust.informatik.tu-darmstadt.de

      Language: English - Date: 2015-02-25 06:38:39
      66The Linux Integrity Measurement Architecture and TPM-Based Network Endpoint Assessment Andreas Steffen ITA Institute for Internet Technologies and Applications HSR University of Applied Sciences Rapperswil CH-8640 Rapper

      The Linux Integrity Measurement Architecture and TPM-Based Network Endpoint Assessment Andreas Steffen ITA Institute for Internet Technologies and Applications HSR University of Applied Sciences Rapperswil CH-8640 Rapper

      Add to Reading List

      Source URL: www.strongswan.org

      Language: English - Date: 2012-08-29 15:32:53
      67To appear in the 2010 International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS).  Timing-Accurate TPM Simulation for What-If Explorations in Trusted Computing Vandana Gunupudi

      To appear in the 2010 International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS). Timing-Accurate TPM Simulation for What-If Explorations in Trusted Computing Vandana Gunupudi

      Add to Reading List

      Source URL: nsl.cse.unt.edu

      Language: English - Date: 2012-01-08 09:38:06
        68Definitions and understanding of —information security --cryptology or cryptography --trusted computing --privacy -Xuejia Lai

        Definitions and understanding of —information security --cryptology or cryptography --trusted computing --privacy -Xuejia Lai

        Add to Reading List

        Source URL: cis.sjtu.edu.cn

        Language: English - Date: 2012-12-14 01:12:47
          69A finer grained Network Access Control using TrustView Security Architecture and Trusted Network Connect Architecture Chaitanya Vinay Hazarey CSCI 599tc Trusted Computing, Spring 2007

          A finer grained Network Access Control using TrustView Security Architecture and Trusted Network Connect Architecture Chaitanya Vinay Hazarey CSCI 599tc Trusted Computing, Spring 2007

          Add to Reading List

          Source URL: hazarey.s3.amazonaws.com

          Language: English - Date: 2012-04-12 21:35:06
            70ITL Bulletin, Increasing Visibility and Control of Your ICT Supply Chains (June 2015)

            ITL Bulletin, Increasing Visibility and Control of Your ICT Supply Chains (June 2015)

            Add to Reading List

            Source URL: csrc.nist.gov

            Language: English - Date: 2015-06-15 11:08:27