DOCSLIB.ORG
Explore
Sign Up
Log In
Upload
Search
Home
» Tags
» Trusted Computing
Trusted Computing
Trusted Platform Module (TPM) TCG 1.2 / 2.0
Introduction to Trusted Computing: TPM 101
Trusted Platforms UEFI, PI and TCG-Based Firmware
Open Source TPM Support
Recipe for Mobile Data Security: TPM, Bitlocker, Windows Vista and Active Directory
Attestation and Trusted Computing
Trust and Trusted Computing Platforms
Dell Trusted Device Below the OS Whitepaper
Trusted Computing
Trusted Computing & Digital Rights Management – Theory & Effects
Foundational Trust for Iot – Dennis Mattoon, Microsoft
Governance of Trusted Computing
Trusted Computing and Linux
Using the Windows 8 Platform Crypto Provider and Associated TPM Functionality
Intel Trusted Execution Technology White Paper
Trusted Computing Group (TCG)
Implementing Hardware Roots of Trust: the Trusted Platform Module Comes of Age Sponsored by the Trusted Computing Group (TCG)
Lecture Notes on Trusted Computing
Top View
Trusted Computing: Promise and Risk
Convergence in Trusted Computing and Virtualized Systems: a New Dimension Towards Trusted Intelligent System Thinh Le Vinh, Samia Bouzefrane, Soumya Banerjee
Dominance As a New Trusted Computing Primitive for the Internet of Things
Security and Trust in Digital Rights Management: a Survey
A Technical Introduction to the Use of Trusted Platform Module 2.0 with Linux
Trusted Computing for Military Applications
An Overview of Trusted Computing [Pdf]
Trusted Computing and Provenance: Better Together
Trusted Platform Module Evolution
Trusted Computing: Security and Applications
Implementing Hardware Roots of Trust: the Trusted Platform Module Comes of Age
Trusted Network Connect Standards for Network Security
Policy-Driven Runtime Integrity Enforcement of Virtual Machines
Trusted Computing and the Trusted Platform Module: What All the Fuss Is About Bill Hewitt Due 4/13/06 CS182 JT 1
Foundational Security with Intel® TXT and Citrix Xenserver®
Wave Virtual Smart Card 2.0 Multi-Factor User Authentication for the Enterprise
Trusted Systems in Untrusted Environments: Protecting Against Strong Attackers
OSLO: Improving the Security of Trusted Computing
Separating Hypervisor Trusted Computing Base Supported by Hardware
Cloaking Malware with the Trusted Platform Module
Trusted Computing
TCG: Trusted Computing Architecture Background
Trusted Computing Group - Other Names and Brands Are Properties of Their Respective Owners
Implications for Digital Forensics
The Trusted Computing Revolution
Trusted Platform Module (TPM) Summary
TPM 2.0 Part 1
A Trusted Open Platform
Trusted Computing Platforms This Is a FM Blank Page Graeme Proudler • Liqun Chen • Chris Dalton
Laying a Secure Foundation for Mobile Devices
Trusted Computing
The Trusted Platform Module (TPM) and How to Use It in the Enterprise
Infineon Security Platform Solution
The Controversy Over Trusted Computing
Fpgas for Trusted Cloud Computing
TRUSTED COMPUTING: an EFFECTIVE APPROACH to CYBERSECURITY DEFENSE April 2013
A Brief Introduction to TPM
Trusted Computing Challenges
Creating the Complete Trusted Computing Ecosystem
Trusted Computing
Introduction to Trusted Computing Concepts and TPM
Trusted Computing and DRM
Trusted Computing
Towards a Verified Reference Implementation of a Trusted Platform Module
Accelerating the Implementation of Trusted Computing
Toward Confidential Cloud Computing
Exercise 1: Introduction to Trusted Computing &
The Ten-Page Introduction to Trusted Computing Andrew Martin
Xen Library OS Security Service Infrastructure
Windows 8 Security November, 2011
Technology, Implementation and Application of the Trusted Computing Group Standard (TCG)
Understanding Confidential Computing with Trusted Execution Environments and Trusted Computing Base Models
Trusted Computing and Digital Rights Management Clearinghouse Adam C
How to Implement Trusted Computing
DRM, Trusted Computing and Operating System Architecture