„Trusted computing“
Suchergebnisse
559 Treffer
-
Trusted Systems in Untrusted Environments: Protecting against Strong Attackers
-
Modes of operation for Compressed Sensing based encryption
-
Modes of Operation for Compressed Sensing based Encryption
-
Sustainable Trusted Computing: A Novel Approach for a Flexible and Secure Update of Cryptographic Engines on a Trusted Platform Module
-
Trusted channels and roots of trust in distributed embedded systems
-
Lösungsansätze für Semantic Web Services
-
Analyse von Lösungsansätzen zur semiautomatischen Generierung von RDF-Annotation mit Hilfe von Textmining
-
Regulierung von künstlicher Intelligenz in der EU – praxisbezogene Lösungsansätze für die Sicherheit von KI-Anwendungen
-
Enabling adaptive zero trust networks
-
Author Correction: Long-range QKD without trusted nodes is not possible with current technology
-
Secure Management of Connected Vehicles using a Trusted Computing-enabled Central Security Provider
-
Trust, Privacy, and Identity of Digital Bodies in Social Virtual Reality
-
Advances in Computer Science - ASIAN 2009. Information Security and Privacy – 13th Asian Computing Science Conference, Seoul, Korea, December 14-16, 2009. Proceedings
-
Trusted Systems – First International Conference, INTRUST 2009, Beijing, China, December 17-19, 2009. Revised Selected Papers
-
Next Generation Society. Technological and Legal Issues – Third International Conference, e-Democracy 2009, Athens, Greece, September 23-25, 2009, Revised Selected Papers
-
Hardening High-Assurance Security Systems with Trusted Computing
-
Systems Support for Trusted Execution Environments
-
Three modest proposals for building trust – in social media discourse, the software that powers it and the browsers that run the software
-
Privacy risk assessment of emerging machine learning paradigms
-
Mitigating security and privacy threats from untrusted application components on Android