Trusted computing

Results: 881



#Item
821Disk encryption / Malware / Rootkit / Trusted Platform Module / Trusted Computing Group / Cryptographic software / BitLocker Drive Encryption / Trusted Network Connect / Windows Vista / Computer security / Cyberwarfare / Trusted computing

Stopping Rootkits at the Network Edge January 2007

Add to Reading List

Source URL: www.trustedcomputinggroup.org

Language: English - Date: 2009-06-08 19:45:53
822Computer security / Cryptographic software / Windows Vista / Windows Server / BitLocker Drive Encryption / Windows 7 / Trusted Computing / Password / USB flash drive / Microsoft Windows / Disk encryption / Cryptography

Attacking the BitLocker Boot Process∗ Sven T¨ urpe, Andreas Poller, Jan Steffan,

Add to Reading List

Source URL: testlab.sit.fraunhofer.de

Language: English - Date: 2010-10-27 14:08:18
823Trusted Platform Module / Tamper resistance / Trusted Execution Technology / Next-Generation Secure Computing Base / Computer security / Cryptography / Trusted computing

Chapter 7 Introduction to the TPM

Add to Reading List

Source URL: courses.cs.vt.edu

Language: English - Date: 2010-02-08 17:06:48
824Technology / Internet privacy / Information privacy / Identity theft / TRUSTe / Hewlett-Packard / Ethics / Privacy / Computing

2012 Most Trusted Companies for Privacy© Research Summary

Add to Reading List

Source URL: www.ponemon.org

Language: English - Date: 2013-01-28 14:35:52
825Security / Symbian / Trusted Execution Technology / Windows Mobile / Java Platform /  Micro Edition / Vulnerability / S60 / Mobile virus / Operating system / Computing / Computer security / Smartphones

Trusted Execution Environment

Add to Reading List

Source URL: www.trusted-logic.com

Language: English - Date: 2008-09-19 08:36:05
826Separation kernel / Principle of least privilege / Kernel / Ring / Linux kernel / Trusted computing base / Operating system / Multilevel security / Privilege / Computer security / Computer architecture / Computing

LEAST PRIVILEGE IN SEPARATION KERNELS Timothy E. Levin, Cynthia E. Irvine, Thuy D. Nguyen Department of Computer Science, Naval Postgraduate School, 833 Dyer Rd., Monterey, CA USA

Add to Reading List

Source URL: cisr.nps.edu

Language: English - Date: 2007-11-15 12:21:15
827Trusted Computing Group / Trusted Execution Technology / GlobalPlatform / Ring / BitLocker Drive Encryption / Next-Generation Secure Computing Base / Computer security / Trusted computing / Trusted Platform Module

WHITE PAPER: TPM MOBILE with Trusted Execution Environment for Comprehensive Mobile Device Security

Add to Reading List

Source URL: www.globalplatform.org

Language: English - Date: 2013-04-11 18:26:33
828Computer security / Cryptographic software / Windows Vista / Windows Server / BitLocker Drive Encryption / Windows 7 / Trusted Computing / Password / USB flash drive / Microsoft Windows / Disk encryption / Cryptography

Attacking the BitLocker Boot Process∗ Sven T¨ urpe, Andreas Poller, Jan Steffan,

Add to Reading List

Source URL: testlab.sit.fraunhofer.de

Language: English - Date: 2010-10-27 14:08:18
829Computing / Linux kernel / Cryptography / Trusted Platform Module / Next-Generation Secure Computing Base / Rootkit / Integrity / Vmlinux / Loadable kernel module / Computer security / Security / Trusted computing

USENIX Association Proceedings of the

Add to Reading List

Source URL: static.usenix.org

Language: English - Date: 2004-07-27 13:47:41
830Trusted Execution Technology / Trusted computing base / Trusted Computer System Evaluation Criteria / TCB / Microkernel / Operating system / Secure environment / Next-Generation Secure Computing Base / Computer security / Trusted computing / Trusted Platform Module

Dynamic Root of Trust in Trusted Computing Cong Nie Helsinki University of Technology

Add to Reading List

Source URL: www.tml.tkk.fi

Language: English - Date: 2008-01-03 05:01:33
UPDATE