Trusted Platform Module

Results: 234



#Item
71Considerations for TM BitLocker in ® ® Microsoft Windows 7

Considerations for TM BitLocker in ® ® Microsoft Windows 7

Add to Reading List

Source URL: www.principlelogic.com

Language: English - Date: 2009-11-12 21:12:56
72Dell™ Latitude™ E5400 Discrete Service Manual  Working on Your Computer Adding and Replacing Parts Specifications Diagnostics System Setup

Dell™ Latitude™ E5400 Discrete Service Manual  Working on Your Computer Adding and Replacing Parts Specifications Diagnostics System Setup

Add to Reading List

Source URL: www.levnapc.cz

Language: English - Date: 2014-07-21 19:03:19
73Using the Trusted Platform Module to Enhance OVAL Driven Assessments

Using the Trusted Platform Module to Enhance OVAL Driven Assessments

Add to Reading List

Source URL: oval.mitre.org

Language: English - Date: 2011-03-24 06:59:43
74CS259 Project Report  Security Analysis of Remote Attestation Lavina Jain ([removed]) Jayesh Vyas ([removed])

CS259 Project Report Security Analysis of Remote Attestation Lavina Jain ([removed]) Jayesh Vyas ([removed])

Add to Reading List

Source URL: seclab.stanford.edu

Language: English - Date: 2008-03-20 15:16:48
75SECURE SYSTEMS DESIGN LEENDERT VAN DOORN CORPORATE FELLOW [removed] 1

SECURE SYSTEMS DESIGN LEENDERT VAN DOORN CORPORATE FELLOW [removed] 1

Add to Reading List

Source URL: www.hotchips.org

Language: English - Date: 2014-08-10 23:56:00
76Integrity Protection Solutions for Embedded Systems Dmitry Kasatkin Samsung Open Source Group Samsung Research UK, Finland branch FOSDEM 2014

Integrity Protection Solutions for Embedded Systems Dmitry Kasatkin Samsung Open Source Group Samsung Research UK, Finland branch FOSDEM 2014

Add to Reading List

Source URL: archive.fosdem.org

Language: English - Date: 2014-10-24 07:45:54
77TECHNOLOGY NEWS  Will Proposed Standard Make Mobile Phones More Secure?

TECHNOLOGY NEWS Will Proposed Standard Make Mobile Phones More Secure?

Add to Reading List

Source URL: www.leavcom.com

Language: English - Date: 2013-04-12 14:46:43
78This is the author’s version of a work that was submitted/accepted for publication in the following source: Suriadi, Suriadi, Ouyang, Chun, & Foo, Ernest[removed]Privacy compliance verification in cryptographic protocol

This is the author’s version of a work that was submitted/accepted for publication in the following source: Suriadi, Suriadi, Ouyang, Chun, & Foo, Ernest[removed]Privacy compliance verification in cryptographic protocol

Add to Reading List

Source URL: eprints.qut.edu.au

Language: English - Date: 2013-03-06 18:15:10
79Key Challenges in DRM: An Industry Perspective Brian A. LaMacchia? Microsoft Corporation One Microsoft Way Redmond, WA[removed]USA

Key Challenges in DRM: An Industry Perspective Brian A. LaMacchia? Microsoft Corporation One Microsoft Way Redmond, WA[removed]USA

Add to Reading List

Source URL: www.farcaster.com

Language: English - Date: 2008-08-19 02:49:34
80Microsoft PowerPoint - Secure Device ID.ppt

Microsoft PowerPoint - Secure Device ID.ppt

Add to Reading List

Source URL: ieee802.org

Language: English - Date: 2005-07-18 23:22:07