Back to Results
First PageMeta Content
Computer network security / Computer security / Two-man rule / Software protection dongle / IEEE 802.1X / Kerberos / Security / Authenticator / Computing


Remote Auditing of Software Outputs Using a Trusted Coprocessor Bruce Schneier John Kelsey
Add to Reading List

Document Date: 2014-03-02 23:18:31


Open Document

File Size: 133,82 KB

Share Result on Facebook

City

Minneapolis / /

Company

Authenticated Software / Starting Authenticated Software / Coprocessor Bruce Schneier John Kelsey Counterpane Systems / /

/

Facility

Internet terminal / /

IndustryTerm

entertainment software / joystick systems / computer network / digital signature algorithms / meterable software / online games / home game systems / manufacturing time / regular input device / communications link / insecure communications / Internet terminal / software programs / executable software / distributed computing / telephone line / metered software application / software execution / software program / software metering / telephone keypad / exhaustive search / metered software / game software / software item / authenticatable software / /

Person

P KCC / IDA KCC / /

Product

Authenticator / /

ProvinceOrState

Minnesota / /

Technology

encryption / cryptography / RAM / 5 Protocols Protocols / public key / Program protocol / disk drive / encryption system / smart card / digital signature algorithms / private key / secret key / main protocol / 5.2 Encryption / Flash / Public key encryption / /

SocialTag