<--- Back to Details
First PageDocument Content
Hashing / Logger / Data logger / Data / Logfile / Hash-based message authentication code / Computer security / Information science / Information retrieval / Cryptography / Trusted computing / Trusted Platform Module
Date: 2016-01-24 20:37:43
Hashing
Logger
Data logger
Data
Logfile
Hash-based message authentication code
Computer security
Information science
Information retrieval
Cryptography
Trusted computing
Trusted Platform Module

Continuous Tamper-proof Logging using TPM2.0 Paul England, Limin Jia, James Lorch, and Arunesh Sinha July 9, 2013 (Revised June 16, 2014)

Add to Reading List

Source URL: www.andrew.cmu.edu

Download Document from Source Website

File Size: 528,66 KB

Share Document on Facebook

Similar Documents

CS378, MA375T, PHY341  Homework 1 Homework 1 Introduction to Quantum Information Science

CS378, MA375T, PHY341 Homework 1 Homework 1 Introduction to Quantum Information Science

DocID: 1xVZC - View Document

CS378, MA375T, PHY341  Homework 2 Homework 2 Introduction to Quantum Information Science

CS378, MA375T, PHY341 Homework 2 Homework 2 Introduction to Quantum Information Science

DocID: 1xVYW - View Document

GOV200X – The Politics of Plague Worcester Polytechnic Institute Social Science and Policy Studies Department Sample Syllabus Course Information Professor Patricia Stapleton

GOV200X – The Politics of Plague Worcester Polytechnic Institute Social Science and Policy Studies Department Sample Syllabus Course Information Professor Patricia Stapleton

DocID: 1xVN2 - View Document

HOnions: Detection and Identification of Snooping Tor HSDirs Amirali Sanatinia, Guevara Noubir College of Computer and Information Science Northeastern University, Boston, USA {amirali,noubir}@ccs.neu.edu

HOnions: Detection and Identification of Snooping Tor HSDirs Amirali Sanatinia, Guevara Noubir College of Computer and Information Science Northeastern University, Boston, USA {amirali,noubir}@ccs.neu.edu

DocID: 1xVHD - View Document

Shaanan N Cohney , https://cohney.info , Updated 16 September 2018 EDUCATION & WORK PhD Computer and Information Science Computer and Information Security

Shaanan N Cohney , https://cohney.info , Updated 16 September 2018 EDUCATION & WORK PhD Computer and Information Science Computer and Information Security

DocID: 1xVEY - View Document