<--- Back to Details
First PageDocument Content
Hashing / Logger / Data logger / Data / Logfile / Hash-based message authentication code / Computer security / Information science / Information retrieval / Cryptography / Trusted computing / Trusted Platform Module
Date: 2016-01-24 20:37:43
Hashing
Logger
Data logger
Data
Logfile
Hash-based message authentication code
Computer security
Information science
Information retrieval
Cryptography
Trusted computing
Trusted Platform Module

Continuous Tamper-proof Logging using TPM2.0 Paul England, Limin Jia, James Lorch, and Arunesh Sinha July 9, 2013 (Revised June 16, 2014)

Add to Reading List

Source URL: www.andrew.cmu.edu

Download Document from Source Website

File Size: 528,66 KB

Share Document on Facebook

Similar Documents

AWStats logfile analyzer 7.4 Documentation  Table of contents Reference manual  Release Notes

AWStats logfile analyzer 7.4 Documentation Table of contents Reference manual Release Notes

DocID: 1tI9F - View Document

syslog-ng Store Box PRODUCT DESCRIPTION CopyrightBalaBit IT Security  All rights reserved.

syslog-ng Store Box PRODUCT DESCRIPTION CopyrightBalaBit IT Security All rights reserved.

DocID: 1rh4B - View Document

syslog-ng Store Box PRODUCT DESCRIPTION CopyrightBalaBit IT Security  All rights reserved.

syslog-ng Store Box PRODUCT DESCRIPTION CopyrightBalaBit IT Security All rights reserved.

DocID: 1qRIa - View Document

Microsoft Word - IBSS&K Engineering.doc

Microsoft Word - IBSS&K Engineering.doc

DocID: 1qNIF - View Document

Continuous Tamper-proof Logging Using TPM 2.0 Arunesh Sinha1 , Limin Jia1 , Paul England2 , and Jacob R. Lorch2 1  Carnegie Mellon University, Pittsburgh, Pennsylvania, USA

Continuous Tamper-proof Logging Using TPM 2.0 Arunesh Sinha1 , Limin Jia1 , Paul England2 , and Jacob R. Lorch2 1 Carnegie Mellon University, Pittsburgh, Pennsylvania, USA

DocID: 1q4JW - View Document