Trusted path

Results: 23



#Item
1

® Advantage The fastest path to trusted clinical answers is now even better

Add to Reading List

Source URL: resourcecenter.ovid.com

- Date: 2014-10-07 15:13:18
    2

    ® Advantage The fastest path to trusted clinical answers is now even better

    Add to Reading List

    Source URL: resourcecenter.ovid.com

    - Date: 2017-10-12 11:37:06
      3

      Building Verifiable Trusted Path on Commodity x86 Computers

      Add to Reading List

      Source URL: www.ieee-security.org

      Language: English - Date: 2012-05-22 01:36:13
        4

        Building Verifiable Trusted Path on Commodity x86 Computers

        Add to Reading List

        Source URL: ieee-security.org

        Language: English - Date: 2012-05-22 01:36:13
          5

          In Mobile Security Technologies (MoST), San Francisco, MayGuarDroid: A Trusted Path for Password Entry Tianhao Tong and David Evans University of Virginia [tt4cc, evans]@virginia.edu

          Add to Reading List

          Source URL: www.mostconf.org

          Language: English - Date: 2013-04-20 02:55:32
            6Public-key cryptography / Federated identity / Identity management / Trusted path / Pubcookie / Cryptography / Key management / Public key infrastructure

            m-Identity Protection Trusted Login The Login app on your mobile end devices

            Add to Reading List

            Source URL: www.kobil.com

            Language: English - Date: 2015-04-27 11:53:01
            7Trusted computing / Microkernel / Security / Trusted computing base / Kernel / Trusted path / L4 microkernel family / Next-Generation Secure Computing Base / Ring / Computer security / Computer architecture / System software

            To be published in Proceedings of the 11th ACM SIGOPS European Workshop, Leuven, Belgium, 2004 Reducing TCB size by using untrusted components — small kernels versus virtual-machine monitors Michael Hohmuth

            Add to Reading List

            Source URL: www.eros-os.org

            Language: English - Date: 2005-10-18 08:59:18
            8Cyberwarfare / Phishing / Password / Two-factor authentication / One-time password / Security token / Trusted path / Malware / Integrated Windows Authentication / Security / Computer network security / Computer security

            Secure Systems Editor: S.W. Smith, The TIPPI Point: Toward Trustworthy Interfaces

            Add to Reading List

            Source URL: www.cs.dartmouth.edu

            Language: English - Date: 2005-08-19 15:32:30
            9Trusted path / Compartment / Windows Vista / Graphical user interface / Software architecture / Operating system

            Poster: On the Usability of Secure GUIs Atanas Filyanov1 , Aysegül Nas1 , Melanie Volkamer2 , Marcel Winandy1 1 2 Horst Görtz Institute for IT-Security, Ruhr-University Bochum, Germany

            Add to Reading List

            Source URL: cups.cs.cmu.edu

            Language: English - Date: 2013-06-25 08:17:52
            10Security / Computer security / Identity assurance / Access control / National Strategy for Trusted Identities in Cyberspace / OpenID / Digital identity / Internet privacy / Authentication / Identity / Identity management / Federated identity

            CTO Corner November 2012 Identity Ecosystem: Path to Payments and More Dan Schutzer, CTO, BITS

            Add to Reading List

            Source URL: www.bits.org

            Language: English - Date: 2012-11-14 16:45:11
            UPDATE