Advanced search options
You searched for subject:(TPM Trusted Platform Module )
.
Showing records 1 – 30 of
3434 total matches.
◁ [1] [2] [3] [4] [5] … [115] ▶
Search Limiters
Dates
Universities
Department
Degrees
Languages
Country
▼ Search Limiters
1. Frenn, Evan. Towards a Trustworthy Thin Terminal for Securing Enterprise Networks.
Degree: MS, 2013, Worcester Polytechnic Institute
URL: etd-042513-131901
;
https://digitalcommons.wpi.edu/etd-theses/300
Subjects/Keywords: Late launch; Trusted Platform Module; Trusted Computing
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Frenn, E. (2013). Towards a Trustworthy Thin Terminal for Securing Enterprise Networks. (Thesis). Worcester Polytechnic Institute. Retrieved from etd-042513-131901 ; https://digitalcommons.wpi.edu/etd-theses/300
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Frenn, Evan. “Towards a Trustworthy Thin Terminal for Securing Enterprise Networks.” 2013. Thesis, Worcester Polytechnic Institute. Accessed January 23, 2021. etd-042513-131901 ; https://digitalcommons.wpi.edu/etd-theses/300.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Frenn, Evan. “Towards a Trustworthy Thin Terminal for Securing Enterprise Networks.” 2013. Web. 23 Jan 2021.
Vancouver:
Frenn E. Towards a Trustworthy Thin Terminal for Securing Enterprise Networks. [Internet] [Thesis]. Worcester Polytechnic Institute; 2013. [cited 2021 Jan 23]. Available from: etd-042513-131901 ; https://digitalcommons.wpi.edu/etd-theses/300.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Frenn E. Towards a Trustworthy Thin Terminal for Securing Enterprise Networks. [Thesis]. Worcester Polytechnic Institute; 2013. Available from: etd-042513-131901 ; https://digitalcommons.wpi.edu/etd-theses/300
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
2.
Teixeira, Gabriel Carrijo Bento.
Um Data Diode com hardware criptográfico para Redes Industriais Críticas.
Degree: 2017, Universidade Federal do Amazonas
URL: http://tede.ufam.edu.br/handle/tede/6209
Subjects/Keywords: TPM (Trusted Platform Module); Redes Industriais; Data Diode; Segurança da Informação; CIÊNCIAS EXATAS E DA TERRA: CIÊNCIA DA COMPUTAÇÃO
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Teixeira, G. C. B. (2017). Um Data Diode com hardware criptográfico para Redes Industriais Críticas. (Masters Thesis). Universidade Federal do Amazonas. Retrieved from http://tede.ufam.edu.br/handle/tede/6209
Chicago Manual of Style (16th Edition):
Teixeira, Gabriel Carrijo Bento. “Um Data Diode com hardware criptográfico para Redes Industriais Críticas.” 2017. Masters Thesis, Universidade Federal do Amazonas. Accessed January 23, 2021. http://tede.ufam.edu.br/handle/tede/6209.
MLA Handbook (7th Edition):
Teixeira, Gabriel Carrijo Bento. “Um Data Diode com hardware criptográfico para Redes Industriais Críticas.” 2017. Web. 23 Jan 2021.
Vancouver:
Teixeira GCB. Um Data Diode com hardware criptográfico para Redes Industriais Críticas. [Internet] [Masters thesis]. Universidade Federal do Amazonas; 2017. [cited 2021 Jan 23]. Available from: http://tede.ufam.edu.br/handle/tede/6209.
Council of Science Editors:
Teixeira GCB. Um Data Diode com hardware criptográfico para Redes Industriais Críticas. [Masters Thesis]. Universidade Federal do Amazonas; 2017. Available from: http://tede.ufam.edu.br/handle/tede/6209
3. Buhacoff, Jonathan. TLS-enforced attestation.
Degree: MS, Computer Science, 2013, California State University – Sacramento
URL: http://hdl.handle.net/10211.9/2185
Subjects/Keywords: Trusted Platform Module; TPM; Trusted Computing Group; TCG; Trousers; TSS; OpenSSL
…successor of SSL TPM Trusted Platform Module x 1 Chapter 1 1. INTRODUCTION 1.1 Background In… …Computing Group (TCG) has created specifications for a Trusted Platform Module (TPM… …Combining TLS and TPM 2.2 Trusted Platform Module The Trusted Platform Module (TPM) is a… …does not attempt to determine whether its own platform is trusted. Instead, it allows… …challengers external to the platform to request TPM quotes from the platform and it is the…
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Buhacoff, J. (2013). TLS-enforced attestation. (Masters Thesis). California State University – Sacramento. Retrieved from http://hdl.handle.net/10211.9/2185
Chicago Manual of Style (16th Edition):
Buhacoff, Jonathan. “TLS-enforced attestation.” 2013. Masters Thesis, California State University – Sacramento. Accessed January 23, 2021. http://hdl.handle.net/10211.9/2185.
MLA Handbook (7th Edition):
Buhacoff, Jonathan. “TLS-enforced attestation.” 2013. Web. 23 Jan 2021.
Vancouver:
Buhacoff J. TLS-enforced attestation. [Internet] [Masters thesis]. California State University – Sacramento; 2013. [cited 2021 Jan 23]. Available from: http://hdl.handle.net/10211.9/2185.
Council of Science Editors:
Buhacoff J. TLS-enforced attestation. [Masters Thesis]. California State University – Sacramento; 2013. Available from: http://hdl.handle.net/10211.9/2185
Virginia Tech
4. Asokan, Pranav. Privacy Preserving Authentication Schemes and Applications.
Degree: MS, Computer Engineering, 2017, Virginia Tech
URL: http://hdl.handle.net/10919/86422
Subjects/Keywords: Privacy Preserving Authentication; Direct Anonymous Attestation; Trusted Platform Module
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Asokan, P. (2017). Privacy Preserving Authentication Schemes and Applications. (Masters Thesis). Virginia Tech. Retrieved from http://hdl.handle.net/10919/86422
Chicago Manual of Style (16th Edition):
Asokan, Pranav. “Privacy Preserving Authentication Schemes and Applications.” 2017. Masters Thesis, Virginia Tech. Accessed January 23, 2021. http://hdl.handle.net/10919/86422.
MLA Handbook (7th Edition):
Asokan, Pranav. “Privacy Preserving Authentication Schemes and Applications.” 2017. Web. 23 Jan 2021.
Vancouver:
Asokan P. Privacy Preserving Authentication Schemes and Applications. [Internet] [Masters thesis]. Virginia Tech; 2017. [cited 2021 Jan 23]. Available from: http://hdl.handle.net/10919/86422.
Council of Science Editors:
Asokan P. Privacy Preserving Authentication Schemes and Applications. [Masters Thesis]. Virginia Tech; 2017. Available from: http://hdl.handle.net/10919/86422
Virginia Tech
5. Luther, Noah Robert. Implementing Direct Anonymous Attestation on TPM 2.0.
Degree: MS, Computer Science and Applications, 2017, Virginia Tech
URL: http://hdl.handle.net/10919/86349
Subjects/Keywords: Direct Anonymous Attestation; TPM; Trusted Computing
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Luther, N. R. (2017). Implementing Direct Anonymous Attestation on TPM 2.0. (Masters Thesis). Virginia Tech. Retrieved from http://hdl.handle.net/10919/86349
Chicago Manual of Style (16th Edition):
Luther, Noah Robert. “Implementing Direct Anonymous Attestation on TPM 2.0.” 2017. Masters Thesis, Virginia Tech. Accessed January 23, 2021. http://hdl.handle.net/10919/86349.
MLA Handbook (7th Edition):
Luther, Noah Robert. “Implementing Direct Anonymous Attestation on TPM 2.0.” 2017. Web. 23 Jan 2021.
Vancouver:
Luther NR. Implementing Direct Anonymous Attestation on TPM 2.0. [Internet] [Masters thesis]. Virginia Tech; 2017. [cited 2021 Jan 23]. Available from: http://hdl.handle.net/10919/86349.
Council of Science Editors:
Luther NR. Implementing Direct Anonymous Attestation on TPM 2.0. [Masters Thesis]. Virginia Tech; 2017. Available from: http://hdl.handle.net/10919/86349
University of Waikato
6. Bany Taha, Mohammad Mustafa Mousa. Tamper-Evident Data Provenance .
Degree: 2015, University of Waikato
URL: http://hdl.handle.net/10289/9972
Subjects/Keywords: Trusted; Cloud computing; Tamper-Evident; Security; Progger; TPM; privacy; Provenance
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Bany Taha, M. M. M. (2015). Tamper-Evident Data Provenance . (Masters Thesis). University of Waikato. Retrieved from http://hdl.handle.net/10289/9972
Chicago Manual of Style (16th Edition):
Bany Taha, Mohammad Mustafa Mousa. “Tamper-Evident Data Provenance .” 2015. Masters Thesis, University of Waikato. Accessed January 23, 2021. http://hdl.handle.net/10289/9972.
MLA Handbook (7th Edition):
Bany Taha, Mohammad Mustafa Mousa. “Tamper-Evident Data Provenance .” 2015. Web. 23 Jan 2021.
Vancouver:
Bany Taha MMM. Tamper-Evident Data Provenance . [Internet] [Masters thesis]. University of Waikato; 2015. [cited 2021 Jan 23]. Available from: http://hdl.handle.net/10289/9972.
Council of Science Editors:
Bany Taha MMM. Tamper-Evident Data Provenance . [Masters Thesis]. University of Waikato; 2015. Available from: http://hdl.handle.net/10289/9972
Luleå University of Technology
7. Paladi, Nicolae. Trusted Computing and Secure Virtualization in Cloud Computing.
Degree: 2012, Luleå University of Technology
URL: http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-53678
Subjects/Keywords: Technology; cloud computing; trusted computing; tpm; virtualization; security; Teknik
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Paladi, N. (2012). Trusted Computing and Secure Virtualization in Cloud Computing. (Thesis). Luleå University of Technology. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-53678
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Paladi, Nicolae. “Trusted Computing and Secure Virtualization in Cloud Computing.” 2012. Thesis, Luleå University of Technology. Accessed January 23, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-53678.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Paladi, Nicolae. “Trusted Computing and Secure Virtualization in Cloud Computing.” 2012. Web. 23 Jan 2021.
Vancouver:
Paladi N. Trusted Computing and Secure Virtualization in Cloud Computing. [Internet] [Thesis]. Luleå University of Technology; 2012. [cited 2021 Jan 23]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-53678.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Paladi N. Trusted Computing and Secure Virtualization in Cloud Computing. [Thesis]. Luleå University of Technology; 2012. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-53678
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Linköping University
8. Qazi, Hasham Ud Din. Comparative Study of Network Access Control Technologies.
Degree: Computer and Information Science, 2007, Linköping University
URL: http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-8971
Subjects/Keywords: NAC; Network Access Control; Trusted Platform Module; Trusted Computing Group; Trusted Network Connect; Network Access Protection; Network Admission Control; 802.1X; root of trust; Computer Sciences; Datavetenskap (datalogi)
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Qazi, H. U. D. (2007). Comparative Study of Network Access Control Technologies. (Thesis). Linköping University. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-8971
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Qazi, Hasham Ud Din. “Comparative Study of Network Access Control Technologies.” 2007. Thesis, Linköping University. Accessed January 23, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-8971.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Qazi, Hasham Ud Din. “Comparative Study of Network Access Control Technologies.” 2007. Web. 23 Jan 2021.
Vancouver:
Qazi HUD. Comparative Study of Network Access Control Technologies. [Internet] [Thesis]. Linköping University; 2007. [cited 2021 Jan 23]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-8971.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Qazi HUD. Comparative Study of Network Access Control Technologies. [Thesis]. Linköping University; 2007. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-8971
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
NSYSU
9. Huang, Shih-Ping. A Dream - Come - True Platform for Small Potatoes.
Degree: Master, EMBA, 2014, NSYSU
URL: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0720114-113342
Subjects/Keywords: Platform; Business Module; E-Marketplace
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Huang, S. (2014). A Dream - Come - True Platform for Small Potatoes. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0720114-113342
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Huang, Shih-Ping. “A Dream - Come - True Platform for Small Potatoes.” 2014. Thesis, NSYSU. Accessed January 23, 2021. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0720114-113342.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Huang, Shih-Ping. “A Dream - Come - True Platform for Small Potatoes.” 2014. Web. 23 Jan 2021.
Vancouver:
Huang S. A Dream - Come - True Platform for Small Potatoes. [Internet] [Thesis]. NSYSU; 2014. [cited 2021 Jan 23]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0720114-113342.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Huang S. A Dream - Come - True Platform for Small Potatoes. [Thesis]. NSYSU; 2014. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0720114-113342
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
University of North Texas
10. Shah, Tawfiq M. Radium: Secure Policy Engine in Hypervisor.
Degree: 2015, University of North Texas
URL: https://digital.library.unt.edu/ark:/67531/metadc804971/
Subjects/Keywords: Trusted computing; TPM remote attestation; trusted boot; ORTM; SRTM; XEN; XSM; Computer architecture.; Computer security.; System design.
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Shah, T. M. (2015). Radium: Secure Policy Engine in Hypervisor. (Thesis). University of North Texas. Retrieved from https://digital.library.unt.edu/ark:/67531/metadc804971/
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Shah, Tawfiq M. “Radium: Secure Policy Engine in Hypervisor.” 2015. Thesis, University of North Texas. Accessed January 23, 2021. https://digital.library.unt.edu/ark:/67531/metadc804971/.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Shah, Tawfiq M. “Radium: Secure Policy Engine in Hypervisor.” 2015. Web. 23 Jan 2021.
Vancouver:
Shah TM. Radium: Secure Policy Engine in Hypervisor. [Internet] [Thesis]. University of North Texas; 2015. [cited 2021 Jan 23]. Available from: https://digital.library.unt.edu/ark:/67531/metadc804971/.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Shah TM. Radium: Secure Policy Engine in Hypervisor. [Thesis]. University of North Texas; 2015. Available from: https://digital.library.unt.edu/ark:/67531/metadc804971/
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
University of North Texas
11. Tarigopula, Mohan Krishna. Integrity Verification of Applications on RADIUM Architecture.
Degree: 2015, University of North Texas
URL: https://digital.library.unt.edu/ark:/67531/metadc804915/
Subjects/Keywords: Application integrity; trusted computing; daikon invariants; RADIUM; TPM; Computer architecture.; Computer security.; System design.
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Tarigopula, M. K. (2015). Integrity Verification of Applications on RADIUM Architecture. (Thesis). University of North Texas. Retrieved from https://digital.library.unt.edu/ark:/67531/metadc804915/
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Tarigopula, Mohan Krishna. “Integrity Verification of Applications on RADIUM Architecture.” 2015. Thesis, University of North Texas. Accessed January 23, 2021. https://digital.library.unt.edu/ark:/67531/metadc804915/.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Tarigopula, Mohan Krishna. “Integrity Verification of Applications on RADIUM Architecture.” 2015. Web. 23 Jan 2021.
Vancouver:
Tarigopula MK. Integrity Verification of Applications on RADIUM Architecture. [Internet] [Thesis]. University of North Texas; 2015. [cited 2021 Jan 23]. Available from: https://digital.library.unt.edu/ark:/67531/metadc804915/.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Tarigopula MK. Integrity Verification of Applications on RADIUM Architecture. [Thesis]. University of North Texas; 2015. Available from: https://digital.library.unt.edu/ark:/67531/metadc804915/
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
12. Paladi, Nicolae. Trusted Computing and Secure Virtualization in Cloud Computing.
Degree: 2012, , Security Lab
URL: http://urn.kb.se/resolve?urn=urn:nbn:se:ri:diva-24035
Subjects/Keywords: cloud computing; trusted computing; tpm; virtualization; security; Computer and Information Sciences; Data- och informationsvetenskap
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Paladi, N. (2012). Trusted Computing and Secure Virtualization in Cloud Computing. (Thesis). , Security Lab. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:ri:diva-24035
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Paladi, Nicolae. “Trusted Computing and Secure Virtualization in Cloud Computing.” 2012. Thesis, , Security Lab. Accessed January 23, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:ri:diva-24035.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Paladi, Nicolae. “Trusted Computing and Secure Virtualization in Cloud Computing.” 2012. Web. 23 Jan 2021.
Vancouver:
Paladi N. Trusted Computing and Secure Virtualization in Cloud Computing. [Internet] [Thesis]. , Security Lab; 2012. [cited 2021 Jan 23]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:ri:diva-24035.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Paladi N. Trusted Computing and Secure Virtualization in Cloud Computing. [Thesis]. , Security Lab; 2012. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:ri:diva-24035
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Tampereen ammattikorkeakoulu
13. Ketola, Eetu. Tuotantolinjan hävikkikartoitus.
Degree: 2015, Tampereen ammattikorkeakoulu
URL: http://www.theseus.fi/handle/10024/92614
Subjects/Keywords: TPM
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Ketola, E. (2015). Tuotantolinjan hävikkikartoitus. (Thesis). Tampereen ammattikorkeakoulu. Retrieved from http://www.theseus.fi/handle/10024/92614
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Ketola, Eetu. “Tuotantolinjan hävikkikartoitus.” 2015. Thesis, Tampereen ammattikorkeakoulu. Accessed January 23, 2021. http://www.theseus.fi/handle/10024/92614.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Ketola, Eetu. “Tuotantolinjan hävikkikartoitus.” 2015. Web. 23 Jan 2021.
Vancouver:
Ketola E. Tuotantolinjan hävikkikartoitus. [Internet] [Thesis]. Tampereen ammattikorkeakoulu; 2015. [cited 2021 Jan 23]. Available from: http://www.theseus.fi/handle/10024/92614.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Ketola E. Tuotantolinjan hävikkikartoitus. [Thesis]. Tampereen ammattikorkeakoulu; 2015. Available from: http://www.theseus.fi/handle/10024/92614
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Queensland University of Technology
14. Seifi, Younes. Formal analysis of security properties in trusted computing protocols.
Degree: 2014, Queensland University of Technology
URL: https://eprints.qut.edu.au/68606/
Subjects/Keywords: Coloured Petri Nets; CPN; CPN/Tools; security analysis; TPM; SKAP; OSAP; Trusted Computing; ASK-CTL; formal anlysis
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Seifi, Y. (2014). Formal analysis of security properties in trusted computing protocols. (Thesis). Queensland University of Technology. Retrieved from https://eprints.qut.edu.au/68606/
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Seifi, Younes. “Formal analysis of security properties in trusted computing protocols.” 2014. Thesis, Queensland University of Technology. Accessed January 23, 2021. https://eprints.qut.edu.au/68606/.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Seifi, Younes. “Formal analysis of security properties in trusted computing protocols.” 2014. Web. 23 Jan 2021.
Vancouver:
Seifi Y. Formal analysis of security properties in trusted computing protocols. [Internet] [Thesis]. Queensland University of Technology; 2014. [cited 2021 Jan 23]. Available from: https://eprints.qut.edu.au/68606/.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Seifi Y. Formal analysis of security properties in trusted computing protocols. [Thesis]. Queensland University of Technology; 2014. Available from: https://eprints.qut.edu.au/68606/
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Linköping University
15. Faxö, Elias. Trusted terminal-based systems.
Degree: Electrical Engineering, 2011, Linköping University
URL: http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-69589
Subjects/Keywords: TPM; Trusted systems; Software attestation; Security; TCB; Computer and Information Sciences; Data- och informationsvetenskap; Computer Sciences; Datavetenskap (datalogi)
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Faxö, E. (2011). Trusted terminal-based systems. (Thesis). Linköping University. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-69589
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Faxö, Elias. “Trusted terminal-based systems.” 2011. Thesis, Linköping University. Accessed January 23, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-69589.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Faxö, Elias. “Trusted terminal-based systems.” 2011. Web. 23 Jan 2021.
Vancouver:
Faxö E. Trusted terminal-based systems. [Internet] [Thesis]. Linköping University; 2011. [cited 2021 Jan 23]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-69589.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Faxö E. Trusted terminal-based systems. [Thesis]. Linköping University; 2011. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-69589
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
16. Halling, Brigid Rose. Towards a Formal Verification of the Trusted Platform Module.
Degree: MS, Electrical Engineering & Computer Science, 2013, University of Kansas
URL: http://hdl.handle.net/1808/12299
Subjects/Keywords: Computer science; Formal verification; Tpm; Trusted computing
…techniques. 2.1 Trusted Platform Module The TPM [1] is a discrete hardware chip that… …designed the industry specification for a hardware coprocessor known as the Trusted Platform… …Module [1]. The TPM provides in protected storage of keys and measurements of data… …that report on the state of the platform sent within quotes for remote attestation. The TPM… …platform. Within a TPM, measurement refers to taking a cryptographic hash of the item to be…
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Halling, B. R. (2013). Towards a Formal Verification of the Trusted Platform Module. (Masters Thesis). University of Kansas. Retrieved from http://hdl.handle.net/1808/12299
Chicago Manual of Style (16th Edition):
Halling, Brigid Rose. “Towards a Formal Verification of the Trusted Platform Module.” 2013. Masters Thesis, University of Kansas. Accessed January 23, 2021. http://hdl.handle.net/1808/12299.
MLA Handbook (7th Edition):
Halling, Brigid Rose. “Towards a Formal Verification of the Trusted Platform Module.” 2013. Web. 23 Jan 2021.
Vancouver:
Halling BR. Towards a Formal Verification of the Trusted Platform Module. [Internet] [Masters thesis]. University of Kansas; 2013. [cited 2021 Jan 23]. Available from: http://hdl.handle.net/1808/12299.
Council of Science Editors:
Halling BR. Towards a Formal Verification of the Trusted Platform Module. [Masters Thesis]. University of Kansas; 2013. Available from: http://hdl.handle.net/1808/12299
University of New South Wales
17.
Tan, Hailun.
Secure network programming in wireless sensor networks.
Degree: Computer Science & Engineering, 2010, University of New South Wales
URL: http://handle.unsw.edu.au/1959.4/44835
;
https://unsworks.unsw.edu.au/fapi/datastream/unsworks:8132/SOURCE02?view=true
Subjects/Keywords: Network Programming; Broadcast Authentication; Wireless Sensor Network; Code Dissemination; Trusted Platform Module; Sensor Worm Attack; Wormhole Attack; Remote Attestation; Secure Network Protocol
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Tan, H. (2010). Secure network programming in wireless sensor networks. (Doctoral Dissertation). University of New South Wales. Retrieved from http://handle.unsw.edu.au/1959.4/44835 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:8132/SOURCE02?view=true
Chicago Manual of Style (16th Edition):
Tan, Hailun. “Secure network programming in wireless sensor networks.” 2010. Doctoral Dissertation, University of New South Wales. Accessed January 23, 2021. http://handle.unsw.edu.au/1959.4/44835 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:8132/SOURCE02?view=true.
MLA Handbook (7th Edition):
Tan, Hailun. “Secure network programming in wireless sensor networks.” 2010. Web. 23 Jan 2021.
Vancouver:
Tan H. Secure network programming in wireless sensor networks. [Internet] [Doctoral dissertation]. University of New South Wales; 2010. [cited 2021 Jan 23]. Available from: http://handle.unsw.edu.au/1959.4/44835 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:8132/SOURCE02?view=true.
Council of Science Editors:
Tan H. Secure network programming in wireless sensor networks. [Doctoral Dissertation]. University of New South Wales; 2010. Available from: http://handle.unsw.edu.au/1959.4/44835 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:8132/SOURCE02?view=true
18. James, Matthew David. A Reconfigurable Trusted Platform Module.
Degree: MS, 2017, Brigham Young University
URL: https://scholarsarchive.byu.edu/cgi/viewcontent.cgi?article=7298&context=etd
Subjects/Keywords: FPGA; TPM; Cryptography; Trusted Computing; Electrical and Computer Engineering
…us to authenticate and encrypt data. The Trusted Platform Module (TPM) is a… …trust any device all the time. Enter the Trusted Platform Module; it acts as a safe place for… …Platform Module The Trusted Computing Group (TCG) is a consortium of companies such as… …lem is that for a Trusted Platform Module, you may not actually be able to trust the… …specification for a security device created by the Trusted Computing Group (TCG). The TPM…
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
James, M. D. (2017). A Reconfigurable Trusted Platform Module. (Masters Thesis). Brigham Young University. Retrieved from https://scholarsarchive.byu.edu/cgi/viewcontent.cgi?article=7298&context=etd
Chicago Manual of Style (16th Edition):
James, Matthew David. “A Reconfigurable Trusted Platform Module.” 2017. Masters Thesis, Brigham Young University. Accessed January 23, 2021. https://scholarsarchive.byu.edu/cgi/viewcontent.cgi?article=7298&context=etd.
MLA Handbook (7th Edition):
James, Matthew David. “A Reconfigurable Trusted Platform Module.” 2017. Web. 23 Jan 2021.
Vancouver:
James MD. A Reconfigurable Trusted Platform Module. [Internet] [Masters thesis]. Brigham Young University; 2017. [cited 2021 Jan 23]. Available from: https://scholarsarchive.byu.edu/cgi/viewcontent.cgi?article=7298&context=etd.
Council of Science Editors:
James MD. A Reconfigurable Trusted Platform Module. [Masters Thesis]. Brigham Young University; 2017. Available from: https://scholarsarchive.byu.edu/cgi/viewcontent.cgi?article=7298&context=etd
University of Kentucky
19. Karumanchi, Sushama. A TRUSTED STORAGE SYSTEM FOR THE CLOUD.
Degree: 2010, University of Kentucky
URL: https://uknowledge.uky.edu/gradschool_theses/22
Subjects/Keywords: Trusted Storage; Cloud Computing; Trusted Platform; Encrypted File System; Cloud Storage; Computer Sciences
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Karumanchi, S. (2010). A TRUSTED STORAGE SYSTEM FOR THE CLOUD. (Masters Thesis). University of Kentucky. Retrieved from https://uknowledge.uky.edu/gradschool_theses/22
Chicago Manual of Style (16th Edition):
Karumanchi, Sushama. “A TRUSTED STORAGE SYSTEM FOR THE CLOUD.” 2010. Masters Thesis, University of Kentucky. Accessed January 23, 2021. https://uknowledge.uky.edu/gradschool_theses/22.
MLA Handbook (7th Edition):
Karumanchi, Sushama. “A TRUSTED STORAGE SYSTEM FOR THE CLOUD.” 2010. Web. 23 Jan 2021.
Vancouver:
Karumanchi S. A TRUSTED STORAGE SYSTEM FOR THE CLOUD. [Internet] [Masters thesis]. University of Kentucky; 2010. [cited 2021 Jan 23]. Available from: https://uknowledge.uky.edu/gradschool_theses/22.
Council of Science Editors:
Karumanchi S. A TRUSTED STORAGE SYSTEM FOR THE CLOUD. [Masters Thesis]. University of Kentucky; 2010. Available from: https://uknowledge.uky.edu/gradschool_theses/22
KTH
20. Tesfaye, Mussie. Secure Reprogramming of a Network Connected Device : Securing programmable logic controllers.
Degree: CoS, 2012, KTH
URL: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-104077
Subjects/Keywords: SCADA; PLC; SCADA security; SCADA networks; PLC security; Trusted computing; TCM; TPM; Embedded security; Digital security; SCADA; PLC; SCADA säkerhet; SCADA-nätverk; PLC säkerhet; pålitlig datoranvändning; TCM; TPM; inbäddad säkerhetlösningar; datasäkerhet
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Tesfaye, M. (2012). Secure Reprogramming of a Network Connected Device : Securing programmable logic controllers. (Thesis). KTH. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-104077
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Tesfaye, Mussie. “Secure Reprogramming of a Network Connected Device : Securing programmable logic controllers.” 2012. Thesis, KTH. Accessed January 23, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-104077.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Tesfaye, Mussie. “Secure Reprogramming of a Network Connected Device : Securing programmable logic controllers.” 2012. Web. 23 Jan 2021.
Vancouver:
Tesfaye M. Secure Reprogramming of a Network Connected Device : Securing programmable logic controllers. [Internet] [Thesis]. KTH; 2012. [cited 2021 Jan 23]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-104077.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Tesfaye M. Secure Reprogramming of a Network Connected Device : Securing programmable logic controllers. [Thesis]. KTH; 2012. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-104077
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
21. Velagapalli, Arun. Minimal trusted computing base for critical infrastructure protection.
Degree: PhD, Computer Science and Engineering, 2013, Mississippi State University
URL: http://sun.library.msstate.edu/ETD-db/theses/available/etd-04192013-084612/
;
Subjects/Keywords: Critical Infrastructure; Security; DNS; DNSSEC; SCADA security; Data Dissemination Systems; Trusted Computing base; TCG; Trusted Module
…systems was outlined in [72]. This architecture, based on a trusted hardware module… …the perspective of module T 3.4.1 Static vs Dynamic Data . . . . . . . . . . . . . . 3.4.2… …Operation of module . . . . . . . . 7.3.1 Module Interfaces . . . . . . vi… …8.4.1 Module Registers . . . . . . . . . . . . . . . . . . 8.4.2 Initializing Peer Parameters… …Simplified Trusted Computing Model . . . . . . . . . . . . . . . . . . . . . 39 3.3 Security…
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Velagapalli, A. (2013). Minimal trusted computing base for critical infrastructure protection. (Doctoral Dissertation). Mississippi State University. Retrieved from http://sun.library.msstate.edu/ETD-db/theses/available/etd-04192013-084612/ ;
Chicago Manual of Style (16th Edition):
Velagapalli, Arun. “Minimal trusted computing base for critical infrastructure protection.” 2013. Doctoral Dissertation, Mississippi State University. Accessed January 23, 2021. http://sun.library.msstate.edu/ETD-db/theses/available/etd-04192013-084612/ ;.
MLA Handbook (7th Edition):
Velagapalli, Arun. “Minimal trusted computing base for critical infrastructure protection.” 2013. Web. 23 Jan 2021.
Vancouver:
Velagapalli A. Minimal trusted computing base for critical infrastructure protection. [Internet] [Doctoral dissertation]. Mississippi State University; 2013. [cited 2021 Jan 23]. Available from: http://sun.library.msstate.edu/ETD-db/theses/available/etd-04192013-084612/ ;.
Council of Science Editors:
Velagapalli A. Minimal trusted computing base for critical infrastructure protection. [Doctoral Dissertation]. Mississippi State University; 2013. Available from: http://sun.library.msstate.edu/ETD-db/theses/available/etd-04192013-084612/ ;
NSYSU
22. Lin, I-Hui. Reserch on TPM Program Practice- a case study of SYSCO.
Degree: Master, EMBA, 2003, NSYSU
URL: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0729103-130814
Subjects/Keywords: TPM
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Lin, I. (2003). Reserch on TPM Program Practice- a case study of SYSCO. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0729103-130814
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Lin, I-Hui. “Reserch on TPM Program Practice- a case study of SYSCO.” 2003. Thesis, NSYSU. Accessed January 23, 2021. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0729103-130814.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Lin, I-Hui. “Reserch on TPM Program Practice- a case study of SYSCO.” 2003. Web. 23 Jan 2021.
Vancouver:
Lin I. Reserch on TPM Program Practice- a case study of SYSCO. [Internet] [Thesis]. NSYSU; 2003. [cited 2021 Jan 23]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0729103-130814.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Lin I. Reserch on TPM Program Practice- a case study of SYSCO. [Thesis]. NSYSU; 2003. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0729103-130814
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Royal Holloway, University of London
23. Yap, Jiun Yi. Identifying trust properties and developing trusted systems for end-to-end trust.
Degree: PhD, 2016, Royal Holloway, University of London
URL: https://pure.royalholloway.ac.uk/portal/en/publications/identifying-trust-properties-and-developing-trusted-systems-for-endtoend-trust(aac59546-d62f-458a-908b-c61a4df2a97e).html
;
https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.792577
Subjects/Keywords: Trusted Computing
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Yap, J. Y. (2016). Identifying trust properties and developing trusted systems for end-to-end trust. (Doctoral Dissertation). Royal Holloway, University of London. Retrieved from https://pure.royalholloway.ac.uk/portal/en/publications/identifying-trust-properties-and-developing-trusted-systems-for-endtoend-trust(aac59546-d62f-458a-908b-c61a4df2a97e).html ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.792577
Chicago Manual of Style (16th Edition):
Yap, Jiun Yi. “Identifying trust properties and developing trusted systems for end-to-end trust.” 2016. Doctoral Dissertation, Royal Holloway, University of London. Accessed January 23, 2021. https://pure.royalholloway.ac.uk/portal/en/publications/identifying-trust-properties-and-developing-trusted-systems-for-endtoend-trust(aac59546-d62f-458a-908b-c61a4df2a97e).html ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.792577.
MLA Handbook (7th Edition):
Yap, Jiun Yi. “Identifying trust properties and developing trusted systems for end-to-end trust.” 2016. Web. 23 Jan 2021.
Vancouver:
Yap JY. Identifying trust properties and developing trusted systems for end-to-end trust. [Internet] [Doctoral dissertation]. Royal Holloway, University of London; 2016. [cited 2021 Jan 23]. Available from: https://pure.royalholloway.ac.uk/portal/en/publications/identifying-trust-properties-and-developing-trusted-systems-for-endtoend-trust(aac59546-d62f-458a-908b-c61a4df2a97e).html ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.792577.
Council of Science Editors:
Yap JY. Identifying trust properties and developing trusted systems for end-to-end trust. [Doctoral Dissertation]. Royal Holloway, University of London; 2016. Available from: https://pure.royalholloway.ac.uk/portal/en/publications/identifying-trust-properties-and-developing-trusted-systems-for-endtoend-trust(aac59546-d62f-458a-908b-c61a4df2a97e).html ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.792577
Linköping University
24. Johansson, Erik. Evaluating performance of a React Native feature set.
Degree: Computer and Information Science, 2018, Linköping University
URL: http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-148323
Subjects/Keywords: React Native; cross-platform; performance; frames per second; proof of concept; limitations; native module; Engineering and Technology; Teknik och teknologier
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Johansson, E. (2018). Evaluating performance of a React Native feature set. (Thesis). Linköping University. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-148323
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Johansson, Erik. “Evaluating performance of a React Native feature set.” 2018. Thesis, Linköping University. Accessed January 23, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-148323.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Johansson, Erik. “Evaluating performance of a React Native feature set.” 2018. Web. 23 Jan 2021.
Vancouver:
Johansson E. Evaluating performance of a React Native feature set. [Internet] [Thesis]. Linköping University; 2018. [cited 2021 Jan 23]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-148323.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Johansson E. Evaluating performance of a React Native feature set. [Thesis]. Linköping University; 2018. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-148323
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
University of Waterloo
25. Juliato, Marcio. Fault Tolerant Cryptographic Primitives for Space Applications.
Degree: 2011, University of Waterloo
URL: http://hdl.handle.net/10012/5876
Subjects/Keywords: Security; Cryptography; Fault Tolerance; Trusted Platform; Space Systems; Hash Functions; Secure Hash Algorithm; SHA-2; Keyed-Hash Message Authentication Code; HMAC; Hardware Implementation; FPGA; Application Specific Processor; Custom Instruction; HW/SW Partitioning
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Juliato, M. (2011). Fault Tolerant Cryptographic Primitives for Space Applications. (Thesis). University of Waterloo. Retrieved from http://hdl.handle.net/10012/5876
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Juliato, Marcio. “Fault Tolerant Cryptographic Primitives for Space Applications.” 2011. Thesis, University of Waterloo. Accessed January 23, 2021. http://hdl.handle.net/10012/5876.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Juliato, Marcio. “Fault Tolerant Cryptographic Primitives for Space Applications.” 2011. Web. 23 Jan 2021.
Vancouver:
Juliato M. Fault Tolerant Cryptographic Primitives for Space Applications. [Internet] [Thesis]. University of Waterloo; 2011. [cited 2021 Jan 23]. Available from: http://hdl.handle.net/10012/5876.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Juliato M. Fault Tolerant Cryptographic Primitives for Space Applications. [Thesis]. University of Waterloo; 2011. Available from: http://hdl.handle.net/10012/5876
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
26. Pogorevc, Simon. RAZVOJ INTELIGENTNEGA OKOLJA ZA PAMETNI DOM NA PLATFORMI ARM.
Degree: 2013, Univerza v Mariboru
URL: https://dk.um.si/IzpisGradiva.php?id=42658
;
https://dk.um.si/Dokument.php?id=60094&dn=
;
https://plus.si.cobiss.net/opac7/bib/17541398?lang=sl
Subjects/Keywords: inteligentno okolje; pametni dom; ARM platforma; XBee modul; ZigBee tehnologija; intelligent environment; smart home; ARM platform; XBee module; ZigBee technology; info:eu-repo/classification/udc/621.38:004.896(043.2)
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Pogorevc, S. (2013). RAZVOJ INTELIGENTNEGA OKOLJA ZA PAMETNI DOM NA PLATFORMI ARM. (Masters Thesis). Univerza v Mariboru. Retrieved from https://dk.um.si/IzpisGradiva.php?id=42658 ; https://dk.um.si/Dokument.php?id=60094&dn= ; https://plus.si.cobiss.net/opac7/bib/17541398?lang=sl
Chicago Manual of Style (16th Edition):
Pogorevc, Simon. “RAZVOJ INTELIGENTNEGA OKOLJA ZA PAMETNI DOM NA PLATFORMI ARM.” 2013. Masters Thesis, Univerza v Mariboru. Accessed January 23, 2021. https://dk.um.si/IzpisGradiva.php?id=42658 ; https://dk.um.si/Dokument.php?id=60094&dn= ; https://plus.si.cobiss.net/opac7/bib/17541398?lang=sl.
MLA Handbook (7th Edition):
Pogorevc, Simon. “RAZVOJ INTELIGENTNEGA OKOLJA ZA PAMETNI DOM NA PLATFORMI ARM.” 2013. Web. 23 Jan 2021.
Vancouver:
Pogorevc S. RAZVOJ INTELIGENTNEGA OKOLJA ZA PAMETNI DOM NA PLATFORMI ARM. [Internet] [Masters thesis]. Univerza v Mariboru; 2013. [cited 2021 Jan 23]. Available from: https://dk.um.si/IzpisGradiva.php?id=42658 ; https://dk.um.si/Dokument.php?id=60094&dn= ; https://plus.si.cobiss.net/opac7/bib/17541398?lang=sl.
Council of Science Editors:
Pogorevc S. RAZVOJ INTELIGENTNEGA OKOLJA ZA PAMETNI DOM NA PLATFORMI ARM. [Masters Thesis]. Univerza v Mariboru; 2013. Available from: https://dk.um.si/IzpisGradiva.php?id=42658 ; https://dk.um.si/Dokument.php?id=60094&dn= ; https://plus.si.cobiss.net/opac7/bib/17541398?lang=sl
Brno University of Technology
27. Malinčík, Ondrej. Otevřená platforma mobilního telefonu: The open mobile phone platform.
Degree: 2019, Brno University of Technology
URL: http://hdl.handle.net/11012/40255
Subjects/Keywords: otvorená; platforma; mobilný; telefón; GSM; modul; AT; príkaz; PIC; správa; napájania; solárny; článok; MPPT; open; mobile; phone; platform; GSM; module; AT; command; PIC; power; management; solar; cell; MPPT
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Malinčík, O. (2019). Otevřená platforma mobilního telefonu: The open mobile phone platform. (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/40255
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Malinčík, Ondrej. “Otevřená platforma mobilního telefonu: The open mobile phone platform.” 2019. Thesis, Brno University of Technology. Accessed January 23, 2021. http://hdl.handle.net/11012/40255.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Malinčík, Ondrej. “Otevřená platforma mobilního telefonu: The open mobile phone platform.” 2019. Web. 23 Jan 2021.
Vancouver:
Malinčík O. Otevřená platforma mobilního telefonu: The open mobile phone platform. [Internet] [Thesis]. Brno University of Technology; 2019. [cited 2021 Jan 23]. Available from: http://hdl.handle.net/11012/40255.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Malinčík O. Otevřená platforma mobilního telefonu: The open mobile phone platform. [Thesis]. Brno University of Technology; 2019. Available from: http://hdl.handle.net/11012/40255
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
28. Cordeiro, Joana Margarida Bento. Lean manufacturing implementation in filling and distribution process in Lactogal, Produtos Alimentares .
Degree: 2020, Universidade de Aveiro
URL: http://hdl.handle.net/10773/29025
Subjects/Keywords: Lean; OEE; 5S; TPM
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Cordeiro, J. M. B. (2020). Lean manufacturing implementation in filling and distribution process in Lactogal, Produtos Alimentares . (Thesis). Universidade de Aveiro. Retrieved from http://hdl.handle.net/10773/29025
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Cordeiro, Joana Margarida Bento. “Lean manufacturing implementation in filling and distribution process in Lactogal, Produtos Alimentares .” 2020. Thesis, Universidade de Aveiro. Accessed January 23, 2021. http://hdl.handle.net/10773/29025.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Cordeiro, Joana Margarida Bento. “Lean manufacturing implementation in filling and distribution process in Lactogal, Produtos Alimentares .” 2020. Web. 23 Jan 2021.
Vancouver:
Cordeiro JMB. Lean manufacturing implementation in filling and distribution process in Lactogal, Produtos Alimentares . [Internet] [Thesis]. Universidade de Aveiro; 2020. [cited 2021 Jan 23]. Available from: http://hdl.handle.net/10773/29025.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Cordeiro JMB. Lean manufacturing implementation in filling and distribution process in Lactogal, Produtos Alimentares . [Thesis]. Universidade de Aveiro; 2020. Available from: http://hdl.handle.net/10773/29025
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Uppsala University
29. Bemler, Daniel. Visualisering av produktionseffektivitet : Utveckling av ett verktyg för övervakningav avbrott och presentation av TAK.
Degree: Industrial Engineering & Management, 2011, Uppsala University
URL: http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-157124
Subjects/Keywords: TAK; produktionseffektivitet; TPM; processövervakning
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Bemler, D. (2011). Visualisering av produktionseffektivitet : Utveckling av ett verktyg för övervakningav avbrott och presentation av TAK. (Thesis). Uppsala University. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-157124
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Bemler, Daniel. “Visualisering av produktionseffektivitet : Utveckling av ett verktyg för övervakningav avbrott och presentation av TAK.” 2011. Thesis, Uppsala University. Accessed January 23, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-157124.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Bemler, Daniel. “Visualisering av produktionseffektivitet : Utveckling av ett verktyg för övervakningav avbrott och presentation av TAK.” 2011. Web. 23 Jan 2021.
Vancouver:
Bemler D. Visualisering av produktionseffektivitet : Utveckling av ett verktyg för övervakningav avbrott och presentation av TAK. [Internet] [Thesis]. Uppsala University; 2011. [cited 2021 Jan 23]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-157124.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Bemler D. Visualisering av produktionseffektivitet : Utveckling av ett verktyg för övervakningav avbrott och presentation av TAK. [Thesis]. Uppsala University; 2011. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-157124
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
30. Solsjö, Oskar. Secure key management in a trusted domain on mobile devices.
Degree: Faculty of Science & Engineering, 2015, Linköping UniversityLinköping University
URL: http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-118501
Subjects/Keywords: TPM; TEE; Common Criteria; Evaluation
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Solsjö, O. (2015). Secure key management in a trusted domain on mobile devices. (Thesis). Linköping UniversityLinköping University. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-118501
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Solsjö, Oskar. “Secure key management in a trusted domain on mobile devices.” 2015. Thesis, Linköping UniversityLinköping University. Accessed January 23, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-118501.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Solsjö, Oskar. “Secure key management in a trusted domain on mobile devices.” 2015. Web. 23 Jan 2021.
Vancouver:
Solsjö O. Secure key management in a trusted domain on mobile devices. [Internet] [Thesis]. Linköping UniversityLinköping University; 2015. [cited 2021 Jan 23]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-118501.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Solsjö O. Secure key management in a trusted domain on mobile devices. [Thesis]. Linköping UniversityLinköping University; 2015. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-118501
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation