- Home
- » Tags
- » Trusted Platform Module
Top View
- Secure Computing on Reconfigurable Systems
- Stmicroelectronics Common Criteria for It Security Evaluation
- Documents Currently Open for Public Review and Comment
- Martin Pirker, Johannes Winter {Mpirker,Jwinter}@Iaik.Tugraz.At
- Xerox Versalink Printers and Multifunction Printers Evaluator Guide
- Subverting Trusted Platform Module While You Are Sleeping
- Standards Analysis Ict Sector Luxembourg
- Trusted Platform Module TPM Fundamental
- Windows Bitlocker
- Using Trusted Platform Module for Securing Virtual Environment Access in Cloud
- SDOS: Using Trusted Platform Modules for Secure Cryptographic Deletion in the Swift Object Store
- Certicloud and Jshadobf Towards Integrity and Software Protection in Cloud Computing Platforms
- A Technical Introduction to the Use of Trusted Platform Module 2.0 with Linux
- Trusted Platform Module Library Part 3: Commands TCG Published
- (TCG) Personal Computer (PC) Specific Trusted Building Block (TBB) Protection Profile and TCG PC Specific TBB with Maintenance Protection Profile
- TPM-Based Authentication Mechanism for Apache Hadoop
- Choose the Right System When Upgrading to Microsoft® SQL Server® 2019 on Microsoft® Hyper-V®
- Eb-2019-00359 Document Date
- EMEA IPG LES PLP 2P 7Pt Datasheet
- Trusted Platform Module Evolution
- Trusted Systems in Untrusted Environments: Protecting Against Strong Attackers
- Chapter 7 Introduction to the TPM
- Trustworthy Computing at APL
- Emmett Witchel
- Certification Report BSI-CC-PP-0030-2008
- Oce Solutions
- Keeping Your Data Secure with SQL Server 2016
- A Technical Introduction to the Use of Trusted Platform Module 2.0 with Vmware Vsphere 6.7
- ICITPM: Integrity Validation of Software in Iterative Continuous Integration Through the Use of Trusted Platform Module (TPM)
- Trusted Platform Module (TPM) Quick Reference Guide
- Towards a Verified Reference Implementation of the Trusted Platform Module
- A Reconfigurable Trusted Platform Module Matthew Ad Vid James Brigham Young University
- ISO Security News Fumy
- Simtpm: User-Centric TPM for Mobile Devices
- Security of Hard Disk Encryption
- ISO Security Standardization an Update on ISO/IEC JTC an Update
- CS1 ICT SCRM Ad Hoc Has Established a Successful Model for Targeted US Government Engagement in International Standards Development
- STANDARDS ANALYSIS ICT SECTOR LUXEMBOURG Executive Summary
- 3.5-SBC-APL V2.0 User Guide
- Trusted Platform Module (TPM) Summary
- Certification Report BSI-DSZ-CC-1100-2018
- The Trusted Platform Module Specifications
- Configuring Trusted Platform Module
- A Survey of Information Security Implementations for the Internet of Things
- Processor Extensions for Security
- The Controversy Over Trusted Computing
- Design, Implementation, and Evaluation of a Vehicular Hardware Security Module
- HP Trusted Platform Module Plug in and Protect
- Enabling Remote Attestation for the Android Platform
- Logical Attestation: an Authorization Architecture for Trustworthy Computing
- HP Trusted Platform Module Plug in and Protect
- Security+ Guide to Network Security Fundamentals, Fourth Edition
- Bizhub I-SERIES IS SMARTER WORKING RETHINK IT 2 Bizhub 4050I Datasheet
- Trusted Platform Module with TCG 2.0
- Iso/Iec 29115:2011 (E)
- Towards a Verified Reference Implementation of a Trusted Platform Module
- Security Aspects
- Security Verification of Hardware-Enabled Attestation
- Hardware Security Primitives for Vehicles Carson Labrado, Himanshu Thapliyal
- Protection Profile PC Client Specific TPM TCG Published
- Property Based Token Attestation in Mobile Computing Thinh Le Vinh, Hervé Cagnon, Samia Bouzefrane, Soumya Banerjee
- Business Plan for JTC 1/SC 27
- Processor-Based Trustworthy Tailored Attestation
- Content Management and Protection Using Trusted Computing and MPEG-21 Technologies
- Trusted Platform Module SLB9670 2.0 V7.85
- IBM Websphere Datapower SOA Appliances What’S New in 2012 and Beyond
- HP Pagewide Enterprise Color MFP 586 Series Ultimate Value,3 Fastest Speeds,1 and Deepest Security2 for Today’S Enterprise
- Cryptographic Hash Functions Recent Results on Cryptanalysis and Their Implications on System Security
- Trust Framework for the Cloud Using a Model of Trust, Data Movement Policies, and Decentralization Using Blockchain Technology
- Preview of "ISO Catalog"