Back to Results
First PageMeta Content
Espionage / Packaging / Disk encryption / Tamper resistance / Computer security / FIPS 140-2 / IBM / Data security / Encryption / Cryptography / Security / Technology


Trusted Hardware Radu Sion Stony Brook Trusted Hardware Laboratory An important part of the tutorial will lie in conveying the insights of how practical limitations of
Add to Reading List

Document Date: 2008-10-06 10:03:17


Open Document

File Size: 29,30 KB

Share Result on Facebook

Company

Xerox / IBM Research / Applied Cryptography Laboratory / Computer Sciences / IBM Cryptography Group / Motorola Labs / Stony Brook Trusted Hardware Laboratory / /

/

Event

Product Issues / /

Facility

Stony Brook Trusted Hardware Laboratory / Stony Brook University / /

IndustryTerm

computation services / data privacy solutions / online banking / secure co-processors / service processing components / computing / regulatory compliant systems / defense applications / /

Organization

Stony Brook Office / National Science Foundation / Trusted Hardware Radu Sion Stony Brook Trusted Hardware Laboratory / Center of Excellence / /

Person

Radu Sion / /

Position

assistant professor / Speaker / Vice-President for Research / /

Product

behavior / malicious compromise / /

Technology

encryption / cryptography / Information Technology / secure co-processors / /

SocialTag