Trusted path

Results: 23



#Item
1®  Advantage The fastest path to trusted clinical answers is now even better

® Advantage The fastest path to trusted clinical answers is now even better

Add to Reading List

Source URL: resourcecenter.ovid.com

- Date: 2014-10-07 15:13:18
    2®  Advantage The fastest path to trusted clinical answers is now even better

    ® Advantage The fastest path to trusted clinical answers is now even better

    Add to Reading List

    Source URL: resourcecenter.ovid.com

    - Date: 2017-10-12 11:37:06
      3Building Verifiable Trusted Path on Commodity x86 Computers

      Building Verifiable Trusted Path on Commodity x86 Computers

      Add to Reading List

      Source URL: www.ieee-security.org

      Language: English - Date: 2012-05-22 01:36:13
        4Building Verifiable Trusted Path on Commodity x86 Computers

        Building Verifiable Trusted Path on Commodity x86 Computers

        Add to Reading List

        Source URL: ieee-security.org

        Language: English - Date: 2012-05-22 01:36:13
          5In Mobile Security Technologies (MoST), San Francisco, MayGuarDroid: A Trusted Path for Password Entry Tianhao Tong and David Evans University of Virginia [tt4cc, evans]@virginia.edu

          In Mobile Security Technologies (MoST), San Francisco, MayGuarDroid: A Trusted Path for Password Entry Tianhao Tong and David Evans University of Virginia [tt4cc, evans]@virginia.edu

          Add to Reading List

          Source URL: www.mostconf.org

          Language: English - Date: 2013-04-20 02:55:32
            6m-Identity Protection Trusted Login The Login app on your mobile end devices

            m-Identity Protection Trusted Login The Login app on your mobile end devices

            Add to Reading List

            Source URL: www.kobil.com

            Language: English - Date: 2015-04-27 11:53:01
            7To be published in Proceedings of the 11th ACM SIGOPS European Workshop, Leuven, Belgium, 2004  Reducing TCB size by using untrusted components — small kernels versus virtual-machine monitors Michael Hohmuth

            To be published in Proceedings of the 11th ACM SIGOPS European Workshop, Leuven, Belgium, 2004 Reducing TCB size by using untrusted components — small kernels versus virtual-machine monitors Michael Hohmuth

            Add to Reading List

            Source URL: www.eros-os.org

            Language: English - Date: 2005-10-18 08:59:18
            8Secure Systems Editor: S.W. Smith,  The TIPPI Point: Toward Trustworthy Interfaces

            Secure Systems Editor: S.W. Smith, The TIPPI Point: Toward Trustworthy Interfaces

            Add to Reading List

            Source URL: www.cs.dartmouth.edu

            Language: English - Date: 2005-08-19 15:32:30
            9Poster: On the Usability of Secure GUIs Atanas Filyanov1 , Aysegül Nas1 , Melanie Volkamer2 , Marcel Winandy1 1 2  Horst Görtz Institute for IT-Security, Ruhr-University Bochum, Germany

            Poster: On the Usability of Secure GUIs Atanas Filyanov1 , Aysegül Nas1 , Melanie Volkamer2 , Marcel Winandy1 1 2 Horst Görtz Institute for IT-Security, Ruhr-University Bochum, Germany

            Add to Reading List

            Source URL: cups.cs.cmu.edu

            Language: English - Date: 2013-06-25 08:17:52
            10CTO Corner November 2012 Identity Ecosystem: Path to Payments and More Dan Schutzer, CTO, BITS

            CTO Corner November 2012 Identity Ecosystem: Path to Payments and More Dan Schutzer, CTO, BITS

            Add to Reading List

            Source URL: www.bits.org

            Language: English - Date: 2012-11-14 16:45:11