Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for subject:(TPM Trusted Platform Module ). Showing records 1 – 30 of 3434 total matches.

[1] [2] [3] [4] [5] … [115]

Search Limiters

Last 2 Years | English Only

Degrees

Levels

Languages

Country

▼ Search Limiters

1. Frenn, Evan. Towards a Trustworthy Thin Terminal for Securing Enterprise Networks.

Degree: MS, 2013, Worcester Polytechnic Institute

 Organizations have many employees that lack the technical knowledge to securely operate their machines. These users may open malicious email attachments/links or install unverified software… (more)

Subjects/Keywords: Late launch; Trusted Platform Module; Trusted Computing

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Frenn, E. (2013). Towards a Trustworthy Thin Terminal for Securing Enterprise Networks. (Thesis). Worcester Polytechnic Institute. Retrieved from etd-042513-131901 ; https://digitalcommons.wpi.edu/etd-theses/300

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Frenn, Evan. “Towards a Trustworthy Thin Terminal for Securing Enterprise Networks.” 2013. Thesis, Worcester Polytechnic Institute. Accessed January 23, 2021. etd-042513-131901 ; https://digitalcommons.wpi.edu/etd-theses/300.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Frenn, Evan. “Towards a Trustworthy Thin Terminal for Securing Enterprise Networks.” 2013. Web. 23 Jan 2021.

Vancouver:

Frenn E. Towards a Trustworthy Thin Terminal for Securing Enterprise Networks. [Internet] [Thesis]. Worcester Polytechnic Institute; 2013. [cited 2021 Jan 23]. Available from: etd-042513-131901 ; https://digitalcommons.wpi.edu/etd-theses/300.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Frenn E. Towards a Trustworthy Thin Terminal for Securing Enterprise Networks. [Thesis]. Worcester Polytechnic Institute; 2013. Available from: etd-042513-131901 ; https://digitalcommons.wpi.edu/etd-theses/300

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

2. Teixeira, Gabriel Carrijo Bento. Um Data Diode com hardware criptográfico para Redes Industriais Críticas.

Degree: 2017, Universidade Federal do Amazonas

Redes Industriais são ambientes altamente sensíveis do ponto de vista da Segurança da Informação, visto que incidentes computacionais podem ocasionar prejuízos incalculáveis. Com o passar… (more)

Subjects/Keywords: TPM (Trusted Platform Module); Redes Industriais; Data Diode; Segurança da Informação; CIÊNCIAS EXATAS E DA TERRA: CIÊNCIA DA COMPUTAÇÃO

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Teixeira, G. C. B. (2017). Um Data Diode com hardware criptográfico para Redes Industriais Críticas. (Masters Thesis). Universidade Federal do Amazonas. Retrieved from http://tede.ufam.edu.br/handle/tede/6209

Chicago Manual of Style (16th Edition):

Teixeira, Gabriel Carrijo Bento. “Um Data Diode com hardware criptográfico para Redes Industriais Críticas.” 2017. Masters Thesis, Universidade Federal do Amazonas. Accessed January 23, 2021. http://tede.ufam.edu.br/handle/tede/6209.

MLA Handbook (7th Edition):

Teixeira, Gabriel Carrijo Bento. “Um Data Diode com hardware criptográfico para Redes Industriais Críticas.” 2017. Web. 23 Jan 2021.

Vancouver:

Teixeira GCB. Um Data Diode com hardware criptográfico para Redes Industriais Críticas. [Internet] [Masters thesis]. Universidade Federal do Amazonas; 2017. [cited 2021 Jan 23]. Available from: http://tede.ufam.edu.br/handle/tede/6209.

Council of Science Editors:

Teixeira GCB. Um Data Diode com hardware criptográfico para Redes Industriais Críticas. [Masters Thesis]. Universidade Federal do Amazonas; 2017. Available from: http://tede.ufam.edu.br/handle/tede/6209

3. Buhacoff, Jonathan. TLS-enforced attestation.

Degree: MS, Computer Science, 2013, California State University – Sacramento

 In client-server environments, clients need a mechanism to determine that a server can be trusted to provide services to the client. Transport layer security (TLS)… (more)

Subjects/Keywords: Trusted Platform Module; TPM; Trusted Computing Group; TCG; Trousers; TSS; OpenSSL

…successor of SSL TPM Trusted Platform Module x 1 Chapter 1 1. INTRODUCTION 1.1 Background In… …Computing Group (TCG) has created specifications for a Trusted Platform Module (TPM… …Combining TLS and TPM 2.2 Trusted Platform Module The Trusted Platform Module (TPM) is a… …does not attempt to determine whether its own platform is trusted. Instead, it allows… …challengers external to the platform to request TPM quotes from the platform and it is the… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Buhacoff, J. (2013). TLS-enforced attestation. (Masters Thesis). California State University – Sacramento. Retrieved from http://hdl.handle.net/10211.9/2185

Chicago Manual of Style (16th Edition):

Buhacoff, Jonathan. “TLS-enforced attestation.” 2013. Masters Thesis, California State University – Sacramento. Accessed January 23, 2021. http://hdl.handle.net/10211.9/2185.

MLA Handbook (7th Edition):

Buhacoff, Jonathan. “TLS-enforced attestation.” 2013. Web. 23 Jan 2021.

Vancouver:

Buhacoff J. TLS-enforced attestation. [Internet] [Masters thesis]. California State University – Sacramento; 2013. [cited 2021 Jan 23]. Available from: http://hdl.handle.net/10211.9/2185.

Council of Science Editors:

Buhacoff J. TLS-enforced attestation. [Masters Thesis]. California State University – Sacramento; 2013. Available from: http://hdl.handle.net/10211.9/2185


Virginia Tech

4. Asokan, Pranav. Privacy Preserving Authentication Schemes and Applications.

Degree: MS, Computer Engineering, 2017, Virginia Tech

 With the advent of smart devices, Internet of things and cloud computing the amount of information collected about an individual is enormous. Using this meta-data,… (more)

Subjects/Keywords: Privacy Preserving Authentication; Direct Anonymous Attestation; Trusted Platform Module

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Asokan, P. (2017). Privacy Preserving Authentication Schemes and Applications. (Masters Thesis). Virginia Tech. Retrieved from http://hdl.handle.net/10919/86422

Chicago Manual of Style (16th Edition):

Asokan, Pranav. “Privacy Preserving Authentication Schemes and Applications.” 2017. Masters Thesis, Virginia Tech. Accessed January 23, 2021. http://hdl.handle.net/10919/86422.

MLA Handbook (7th Edition):

Asokan, Pranav. “Privacy Preserving Authentication Schemes and Applications.” 2017. Web. 23 Jan 2021.

Vancouver:

Asokan P. Privacy Preserving Authentication Schemes and Applications. [Internet] [Masters thesis]. Virginia Tech; 2017. [cited 2021 Jan 23]. Available from: http://hdl.handle.net/10919/86422.

Council of Science Editors:

Asokan P. Privacy Preserving Authentication Schemes and Applications. [Masters Thesis]. Virginia Tech; 2017. Available from: http://hdl.handle.net/10919/86422


Virginia Tech

5. Luther, Noah Robert. Implementing Direct Anonymous Attestation on TPM 2.0.

Degree: MS, Computer Science and Applications, 2017, Virginia Tech

 Numerous organizations have pressed in the past several years for improved security and privacy in online interactions. Stakeholders have encouraged the adoption of privacy-enhancing technologies,… (more)

Subjects/Keywords: Direct Anonymous Attestation; TPM; Trusted Computing

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Luther, N. R. (2017). Implementing Direct Anonymous Attestation on TPM 2.0. (Masters Thesis). Virginia Tech. Retrieved from http://hdl.handle.net/10919/86349

Chicago Manual of Style (16th Edition):

Luther, Noah Robert. “Implementing Direct Anonymous Attestation on TPM 2.0.” 2017. Masters Thesis, Virginia Tech. Accessed January 23, 2021. http://hdl.handle.net/10919/86349.

MLA Handbook (7th Edition):

Luther, Noah Robert. “Implementing Direct Anonymous Attestation on TPM 2.0.” 2017. Web. 23 Jan 2021.

Vancouver:

Luther NR. Implementing Direct Anonymous Attestation on TPM 2.0. [Internet] [Masters thesis]. Virginia Tech; 2017. [cited 2021 Jan 23]. Available from: http://hdl.handle.net/10919/86349.

Council of Science Editors:

Luther NR. Implementing Direct Anonymous Attestation on TPM 2.0. [Masters Thesis]. Virginia Tech; 2017. Available from: http://hdl.handle.net/10919/86349


University of Waikato

6. Bany Taha, Mohammad Mustafa Mousa. Tamper-Evident Data Provenance .

Degree: 2015, University of Waikato

 Data Provenance describes what has happened to a users data within a ma- chine as a form of digital evidence. However this type of evidence… (more)

Subjects/Keywords: Trusted; Cloud computing; Tamper-Evident; Security; Progger; TPM; privacy; Provenance

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Bany Taha, M. M. M. (2015). Tamper-Evident Data Provenance . (Masters Thesis). University of Waikato. Retrieved from http://hdl.handle.net/10289/9972

Chicago Manual of Style (16th Edition):

Bany Taha, Mohammad Mustafa Mousa. “Tamper-Evident Data Provenance .” 2015. Masters Thesis, University of Waikato. Accessed January 23, 2021. http://hdl.handle.net/10289/9972.

MLA Handbook (7th Edition):

Bany Taha, Mohammad Mustafa Mousa. “Tamper-Evident Data Provenance .” 2015. Web. 23 Jan 2021.

Vancouver:

Bany Taha MMM. Tamper-Evident Data Provenance . [Internet] [Masters thesis]. University of Waikato; 2015. [cited 2021 Jan 23]. Available from: http://hdl.handle.net/10289/9972.

Council of Science Editors:

Bany Taha MMM. Tamper-Evident Data Provenance . [Masters Thesis]. University of Waikato; 2015. Available from: http://hdl.handle.net/10289/9972


Luleå University of Technology

7. Paladi, Nicolae. Trusted Computing and Secure Virtualization in Cloud Computing.

Degree: 2012, Luleå University of Technology

  Large-scale deployment and use of cloud computing in industry is accompanied and in the same time hampered by concerns regarding protection of data handled… (more)

Subjects/Keywords: Technology; cloud computing; trusted computing; tpm; virtualization; security; Teknik

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Paladi, N. (2012). Trusted Computing and Secure Virtualization in Cloud Computing. (Thesis). Luleå University of Technology. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-53678

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Paladi, Nicolae. “Trusted Computing and Secure Virtualization in Cloud Computing.” 2012. Thesis, Luleå University of Technology. Accessed January 23, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-53678.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Paladi, Nicolae. “Trusted Computing and Secure Virtualization in Cloud Computing.” 2012. Web. 23 Jan 2021.

Vancouver:

Paladi N. Trusted Computing and Secure Virtualization in Cloud Computing. [Internet] [Thesis]. Luleå University of Technology; 2012. [cited 2021 Jan 23]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-53678.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Paladi N. Trusted Computing and Secure Virtualization in Cloud Computing. [Thesis]. Luleå University of Technology; 2012. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-53678

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Linköping University

8. Qazi, Hasham Ud Din. Comparative Study of Network Access Control Technologies.

Degree: Computer and Information Science, 2007, Linköping University

  This thesis presents a comparative study of four Network Access Control (NAC) technologies; Trusted Network Connect by the Trusted Computing group, Juniper Networks, Inc.’s… (more)

Subjects/Keywords: NAC; Network Access Control; Trusted Platform Module; Trusted Computing Group; Trusted Network Connect; Network Access Protection; Network Admission Control; 802.1X; root of trust; Computer Sciences; Datavetenskap (datalogi)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Qazi, H. U. D. (2007). Comparative Study of Network Access Control Technologies. (Thesis). Linköping University. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-8971

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Qazi, Hasham Ud Din. “Comparative Study of Network Access Control Technologies.” 2007. Thesis, Linköping University. Accessed January 23, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-8971.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Qazi, Hasham Ud Din. “Comparative Study of Network Access Control Technologies.” 2007. Web. 23 Jan 2021.

Vancouver:

Qazi HUD. Comparative Study of Network Access Control Technologies. [Internet] [Thesis]. Linköping University; 2007. [cited 2021 Jan 23]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-8971.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Qazi HUD. Comparative Study of Network Access Control Technologies. [Thesis]. Linköping University; 2007. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-8971

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

9. Huang, Shih-Ping. A Dream - Come - True Platform for Small Potatoes.

Degree: Master, EMBA, 2014, NSYSU

 ããThis research is aimed to interpret the difficulties of starting an enterprise, by investigating the willingness and most popular industries. Through bibliography and case studying,… (more)

Subjects/Keywords: Platform; Business Module; E-Marketplace

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Huang, S. (2014). A Dream - Come - True Platform for Small Potatoes. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0720114-113342

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Huang, Shih-Ping. “A Dream - Come - True Platform for Small Potatoes.” 2014. Thesis, NSYSU. Accessed January 23, 2021. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0720114-113342.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Huang, Shih-Ping. “A Dream - Come - True Platform for Small Potatoes.” 2014. Web. 23 Jan 2021.

Vancouver:

Huang S. A Dream - Come - True Platform for Small Potatoes. [Internet] [Thesis]. NSYSU; 2014. [cited 2021 Jan 23]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0720114-113342.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Huang S. A Dream - Come - True Platform for Small Potatoes. [Thesis]. NSYSU; 2014. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0720114-113342

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of North Texas

10. Shah, Tawfiq M. Radium: Secure Policy Engine in Hypervisor.

Degree: 2015, University of North Texas

 The basis of today’s security systems is the trust and confidence that the system will behave as expected and are in a known good trusted(more)

Subjects/Keywords: Trusted computing; TPM remote attestation; trusted boot; ORTM; SRTM; XEN; XSM; Computer architecture.; Computer security.; System design.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Shah, T. M. (2015). Radium: Secure Policy Engine in Hypervisor. (Thesis). University of North Texas. Retrieved from https://digital.library.unt.edu/ark:/67531/metadc804971/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Shah, Tawfiq M. “Radium: Secure Policy Engine in Hypervisor.” 2015. Thesis, University of North Texas. Accessed January 23, 2021. https://digital.library.unt.edu/ark:/67531/metadc804971/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Shah, Tawfiq M. “Radium: Secure Policy Engine in Hypervisor.” 2015. Web. 23 Jan 2021.

Vancouver:

Shah TM. Radium: Secure Policy Engine in Hypervisor. [Internet] [Thesis]. University of North Texas; 2015. [cited 2021 Jan 23]. Available from: https://digital.library.unt.edu/ark:/67531/metadc804971/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Shah TM. Radium: Secure Policy Engine in Hypervisor. [Thesis]. University of North Texas; 2015. Available from: https://digital.library.unt.edu/ark:/67531/metadc804971/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of North Texas

11. Tarigopula, Mohan Krishna. Integrity Verification of Applications on RADIUM Architecture.

Degree: 2015, University of North Texas

Trusted Computing capability has become ubiquitous these days, and it is being widely deployed into consumer devices as well as enterprise platforms. As the number… (more)

Subjects/Keywords: Application integrity; trusted computing; daikon invariants; RADIUM; TPM; Computer architecture.; Computer security.; System design.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Tarigopula, M. K. (2015). Integrity Verification of Applications on RADIUM Architecture. (Thesis). University of North Texas. Retrieved from https://digital.library.unt.edu/ark:/67531/metadc804915/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Tarigopula, Mohan Krishna. “Integrity Verification of Applications on RADIUM Architecture.” 2015. Thesis, University of North Texas. Accessed January 23, 2021. https://digital.library.unt.edu/ark:/67531/metadc804915/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Tarigopula, Mohan Krishna. “Integrity Verification of Applications on RADIUM Architecture.” 2015. Web. 23 Jan 2021.

Vancouver:

Tarigopula MK. Integrity Verification of Applications on RADIUM Architecture. [Internet] [Thesis]. University of North Texas; 2015. [cited 2021 Jan 23]. Available from: https://digital.library.unt.edu/ark:/67531/metadc804915/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Tarigopula MK. Integrity Verification of Applications on RADIUM Architecture. [Thesis]. University of North Texas; 2015. Available from: https://digital.library.unt.edu/ark:/67531/metadc804915/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

12. Paladi, Nicolae. Trusted Computing and Secure Virtualization in Cloud Computing.

Degree: 2012, , Security Lab

  Large-scale deployment and use of cloud computing in industry is accompanied and in the same time hampered by concerns regarding protection of data handled… (more)

Subjects/Keywords: cloud computing; trusted computing; tpm; virtualization; security; Computer and Information Sciences; Data- och informationsvetenskap

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Paladi, N. (2012). Trusted Computing and Secure Virtualization in Cloud Computing. (Thesis). , Security Lab. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:ri:diva-24035

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Paladi, Nicolae. “Trusted Computing and Secure Virtualization in Cloud Computing.” 2012. Thesis, , Security Lab. Accessed January 23, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:ri:diva-24035.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Paladi, Nicolae. “Trusted Computing and Secure Virtualization in Cloud Computing.” 2012. Web. 23 Jan 2021.

Vancouver:

Paladi N. Trusted Computing and Secure Virtualization in Cloud Computing. [Internet] [Thesis]. , Security Lab; 2012. [cited 2021 Jan 23]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:ri:diva-24035.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Paladi N. Trusted Computing and Secure Virtualization in Cloud Computing. [Thesis]. , Security Lab; 2012. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:ri:diva-24035

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Tampereen ammattikorkeakoulu

13. Ketola, Eetu. Tuotantolinjan hävikkikartoitus.

Degree: 2015, Tampereen ammattikorkeakoulu

Työn tarkoitus on kartoittaa jäätelön tuotantolinjan hävikki. Alun perin linjalta oli tiedossa syntyneen biojätteen ja palautusmassan määrä. Mittaus tapahtui Suomen Nestlé Oy:n jäätelötehtaalla Turengissa. Mitattava… (more)

Subjects/Keywords: TPM

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ketola, E. (2015). Tuotantolinjan hävikkikartoitus. (Thesis). Tampereen ammattikorkeakoulu. Retrieved from http://www.theseus.fi/handle/10024/92614

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Ketola, Eetu. “Tuotantolinjan hävikkikartoitus.” 2015. Thesis, Tampereen ammattikorkeakoulu. Accessed January 23, 2021. http://www.theseus.fi/handle/10024/92614.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Ketola, Eetu. “Tuotantolinjan hävikkikartoitus.” 2015. Web. 23 Jan 2021.

Vancouver:

Ketola E. Tuotantolinjan hävikkikartoitus. [Internet] [Thesis]. Tampereen ammattikorkeakoulu; 2015. [cited 2021 Jan 23]. Available from: http://www.theseus.fi/handle/10024/92614.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Ketola E. Tuotantolinjan hävikkikartoitus. [Thesis]. Tampereen ammattikorkeakoulu; 2015. Available from: http://www.theseus.fi/handle/10024/92614

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Queensland University of Technology

14. Seifi, Younes. Formal analysis of security properties in trusted computing protocols.

Degree: 2014, Queensland University of Technology

 This research introduces a general methodology in order to create a Coloured Petri Net (CPN) model of a security protocol. Then standard or user-defined security… (more)

Subjects/Keywords: Coloured Petri Nets; CPN; CPN/Tools; security analysis; TPM; SKAP; OSAP; Trusted Computing; ASK-CTL; formal anlysis

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Seifi, Y. (2014). Formal analysis of security properties in trusted computing protocols. (Thesis). Queensland University of Technology. Retrieved from https://eprints.qut.edu.au/68606/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Seifi, Younes. “Formal analysis of security properties in trusted computing protocols.” 2014. Thesis, Queensland University of Technology. Accessed January 23, 2021. https://eprints.qut.edu.au/68606/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Seifi, Younes. “Formal analysis of security properties in trusted computing protocols.” 2014. Web. 23 Jan 2021.

Vancouver:

Seifi Y. Formal analysis of security properties in trusted computing protocols. [Internet] [Thesis]. Queensland University of Technology; 2014. [cited 2021 Jan 23]. Available from: https://eprints.qut.edu.au/68606/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Seifi Y. Formal analysis of security properties in trusted computing protocols. [Thesis]. Queensland University of Technology; 2014. Available from: https://eprints.qut.edu.au/68606/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Linköping University

15. Faxö, Elias. Trusted terminal-based systems.

Degree: Electrical Engineering, 2011, Linköping University

  Trust is a concept of increasing importance in today’s information systems where information storage and generation to a higher extent is distributed among several… (more)

Subjects/Keywords: TPM; Trusted systems; Software attestation; Security; TCB; Computer and Information Sciences; Data- och informationsvetenskap; Computer Sciences; Datavetenskap (datalogi)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Faxö, E. (2011). Trusted terminal-based systems. (Thesis). Linköping University. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-69589

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Faxö, Elias. “Trusted terminal-based systems.” 2011. Thesis, Linköping University. Accessed January 23, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-69589.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Faxö, Elias. “Trusted terminal-based systems.” 2011. Web. 23 Jan 2021.

Vancouver:

Faxö E. Trusted terminal-based systems. [Internet] [Thesis]. Linköping University; 2011. [cited 2021 Jan 23]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-69589.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Faxö E. Trusted terminal-based systems. [Thesis]. Linköping University; 2011. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-69589

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

16. Halling, Brigid Rose. Towards a Formal Verification of the Trusted Platform Module.

Degree: MS, Electrical Engineering & Computer Science, 2013, University of Kansas

 The Trusted Platform Module (TPM) serves as the root-of-trust in a trusted computing environment, and therefore warrants formal specification and verification. This thesis presents results… (more)

Subjects/Keywords: Computer science; Formal verification; Tpm; Trusted computing

…techniques. 2.1 Trusted Platform Module The TPM [1] is a discrete hardware chip that… …designed the industry specification for a hardware coprocessor known as the Trusted Platform… …Module [1]. The TPM provides in protected storage of keys and measurements of data… …that report on the state of the platform sent within quotes for remote attestation. The TPM… …platform. Within a TPM, measurement refers to taking a cryptographic hash of the item to be… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Halling, B. R. (2013). Towards a Formal Verification of the Trusted Platform Module. (Masters Thesis). University of Kansas. Retrieved from http://hdl.handle.net/1808/12299

Chicago Manual of Style (16th Edition):

Halling, Brigid Rose. “Towards a Formal Verification of the Trusted Platform Module.” 2013. Masters Thesis, University of Kansas. Accessed January 23, 2021. http://hdl.handle.net/1808/12299.

MLA Handbook (7th Edition):

Halling, Brigid Rose. “Towards a Formal Verification of the Trusted Platform Module.” 2013. Web. 23 Jan 2021.

Vancouver:

Halling BR. Towards a Formal Verification of the Trusted Platform Module. [Internet] [Masters thesis]. University of Kansas; 2013. [cited 2021 Jan 23]. Available from: http://hdl.handle.net/1808/12299.

Council of Science Editors:

Halling BR. Towards a Formal Verification of the Trusted Platform Module. [Masters Thesis]. University of Kansas; 2013. Available from: http://hdl.handle.net/1808/12299


University of New South Wales

17. Tan, Hailun. Secure network programming in wireless sensor networks.

Degree: Computer Science & Engineering, 2010, University of New South Wales

 Network programming is one of the most important applications in Wireless Sensor Networks as It provides an efficient way to update program Images running on… (more)

Subjects/Keywords: Network Programming; Broadcast Authentication; Wireless Sensor Network; Code Dissemination; Trusted Platform Module; Sensor Worm Attack; Wormhole Attack; Remote Attestation; Secure Network Protocol

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Tan, H. (2010). Secure network programming in wireless sensor networks. (Doctoral Dissertation). University of New South Wales. Retrieved from http://handle.unsw.edu.au/1959.4/44835 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:8132/SOURCE02?view=true

Chicago Manual of Style (16th Edition):

Tan, Hailun. “Secure network programming in wireless sensor networks.” 2010. Doctoral Dissertation, University of New South Wales. Accessed January 23, 2021. http://handle.unsw.edu.au/1959.4/44835 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:8132/SOURCE02?view=true.

MLA Handbook (7th Edition):

Tan, Hailun. “Secure network programming in wireless sensor networks.” 2010. Web. 23 Jan 2021.

Vancouver:

Tan H. Secure network programming in wireless sensor networks. [Internet] [Doctoral dissertation]. University of New South Wales; 2010. [cited 2021 Jan 23]. Available from: http://handle.unsw.edu.au/1959.4/44835 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:8132/SOURCE02?view=true.

Council of Science Editors:

Tan H. Secure network programming in wireless sensor networks. [Doctoral Dissertation]. University of New South Wales; 2010. Available from: http://handle.unsw.edu.au/1959.4/44835 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:8132/SOURCE02?view=true

18. James, Matthew David. A Reconfigurable Trusted Platform Module.

Degree: MS, 2017, Brigham Young University

 A Trusted Platform Module (TPM) is a security device included in most modern desktop and laptop computers. It helps keep the computing environment secure by… (more)

Subjects/Keywords: FPGA; TPM; Cryptography; Trusted Computing; Electrical and Computer Engineering

…us to authenticate and encrypt data. The Trusted Platform Module (TPM) is a… …trust any device all the time. Enter the Trusted Platform Module; it acts as a safe place for… …Platform Module The Trusted Computing Group (TCG) is a consortium of companies such as… …lem is that for a Trusted Platform Module, you may not actually be able to trust the… …specification for a security device created by the Trusted Computing Group (TCG). The TPM… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

James, M. D. (2017). A Reconfigurable Trusted Platform Module. (Masters Thesis). Brigham Young University. Retrieved from https://scholarsarchive.byu.edu/cgi/viewcontent.cgi?article=7298&context=etd

Chicago Manual of Style (16th Edition):

James, Matthew David. “A Reconfigurable Trusted Platform Module.” 2017. Masters Thesis, Brigham Young University. Accessed January 23, 2021. https://scholarsarchive.byu.edu/cgi/viewcontent.cgi?article=7298&context=etd.

MLA Handbook (7th Edition):

James, Matthew David. “A Reconfigurable Trusted Platform Module.” 2017. Web. 23 Jan 2021.

Vancouver:

James MD. A Reconfigurable Trusted Platform Module. [Internet] [Masters thesis]. Brigham Young University; 2017. [cited 2021 Jan 23]. Available from: https://scholarsarchive.byu.edu/cgi/viewcontent.cgi?article=7298&context=etd.

Council of Science Editors:

James MD. A Reconfigurable Trusted Platform Module. [Masters Thesis]. Brigham Young University; 2017. Available from: https://scholarsarchive.byu.edu/cgi/viewcontent.cgi?article=7298&context=etd


University of Kentucky

19. Karumanchi, Sushama. A TRUSTED STORAGE SYSTEM FOR THE CLOUD.

Degree: 2010, University of Kentucky

 Data stored in third party storage systems like the cloud might not be secure since confidentiality and integrity of data are not guaranteed. Though cloud… (more)

Subjects/Keywords: Trusted Storage; Cloud Computing; Trusted Platform; Encrypted File System; Cloud Storage; Computer Sciences

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Karumanchi, S. (2010). A TRUSTED STORAGE SYSTEM FOR THE CLOUD. (Masters Thesis). University of Kentucky. Retrieved from https://uknowledge.uky.edu/gradschool_theses/22

Chicago Manual of Style (16th Edition):

Karumanchi, Sushama. “A TRUSTED STORAGE SYSTEM FOR THE CLOUD.” 2010. Masters Thesis, University of Kentucky. Accessed January 23, 2021. https://uknowledge.uky.edu/gradschool_theses/22.

MLA Handbook (7th Edition):

Karumanchi, Sushama. “A TRUSTED STORAGE SYSTEM FOR THE CLOUD.” 2010. Web. 23 Jan 2021.

Vancouver:

Karumanchi S. A TRUSTED STORAGE SYSTEM FOR THE CLOUD. [Internet] [Masters thesis]. University of Kentucky; 2010. [cited 2021 Jan 23]. Available from: https://uknowledge.uky.edu/gradschool_theses/22.

Council of Science Editors:

Karumanchi S. A TRUSTED STORAGE SYSTEM FOR THE CLOUD. [Masters Thesis]. University of Kentucky; 2010. Available from: https://uknowledge.uky.edu/gradschool_theses/22


KTH

20. Tesfaye, Mussie. Secure Reprogramming of a Network Connected Device : Securing programmable logic controllers.

Degree: CoS, 2012, KTH

This is a master’s thesis project entitled “Secure reprogramming of network connected devices”. The thesis begins by providing some background information to enable the… (more)

Subjects/Keywords: SCADA; PLC; SCADA security; SCADA networks; PLC security; Trusted computing; TCM; TPM; Embedded security; Digital security; SCADA; PLC; SCADA säkerhet; SCADA-nätverk; PLC säkerhet; pålitlig datoranvändning; TCM; TPM; inbäddad säkerhetlösningar; datasäkerhet

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Tesfaye, M. (2012). Secure Reprogramming of a Network Connected Device : Securing programmable logic controllers. (Thesis). KTH. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-104077

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Tesfaye, Mussie. “Secure Reprogramming of a Network Connected Device : Securing programmable logic controllers.” 2012. Thesis, KTH. Accessed January 23, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-104077.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Tesfaye, Mussie. “Secure Reprogramming of a Network Connected Device : Securing programmable logic controllers.” 2012. Web. 23 Jan 2021.

Vancouver:

Tesfaye M. Secure Reprogramming of a Network Connected Device : Securing programmable logic controllers. [Internet] [Thesis]. KTH; 2012. [cited 2021 Jan 23]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-104077.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Tesfaye M. Secure Reprogramming of a Network Connected Device : Securing programmable logic controllers. [Thesis]. KTH; 2012. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-104077

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

21. Velagapalli, Arun. Minimal trusted computing base for critical infrastructure protection.

Degree: PhD, Computer Science and Engineering, 2013, Mississippi State University

  Critical infrastructures like oil & gas, power grids, water treatment facilities, domain name system (DNS) etc., are attractive targets for attackers both due to… (more)

Subjects/Keywords: Critical Infrastructure; Security; DNS; DNSSEC; SCADA security; Data Dissemination Systems; Trusted Computing base; TCG; Trusted Module

…systems was outlined in [72]. This architecture, based on a trusted hardware module… …the perspective of module T 3.4.1 Static vs Dynamic Data . . . . . . . . . . . . . . 3.4.2… …Operation of module . . . . . . . . 7.3.1 Module Interfaces . . . . . . vi… …8.4.1 Module Registers . . . . . . . . . . . . . . . . . . 8.4.2 Initializing Peer Parameters… …Simplified Trusted Computing Model . . . . . . . . . . . . . . . . . . . . . 39 3.3 Security… 

Page 1 Page 2 Page 3 Page 4 Page 5 Page 6 Page 7 Sample image

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Velagapalli, A. (2013). Minimal trusted computing base for critical infrastructure protection. (Doctoral Dissertation). Mississippi State University. Retrieved from http://sun.library.msstate.edu/ETD-db/theses/available/etd-04192013-084612/ ;

Chicago Manual of Style (16th Edition):

Velagapalli, Arun. “Minimal trusted computing base for critical infrastructure protection.” 2013. Doctoral Dissertation, Mississippi State University. Accessed January 23, 2021. http://sun.library.msstate.edu/ETD-db/theses/available/etd-04192013-084612/ ;.

MLA Handbook (7th Edition):

Velagapalli, Arun. “Minimal trusted computing base for critical infrastructure protection.” 2013. Web. 23 Jan 2021.

Vancouver:

Velagapalli A. Minimal trusted computing base for critical infrastructure protection. [Internet] [Doctoral dissertation]. Mississippi State University; 2013. [cited 2021 Jan 23]. Available from: http://sun.library.msstate.edu/ETD-db/theses/available/etd-04192013-084612/ ;.

Council of Science Editors:

Velagapalli A. Minimal trusted computing base for critical infrastructure protection. [Doctoral Dissertation]. Mississippi State University; 2013. Available from: http://sun.library.msstate.edu/ETD-db/theses/available/etd-04192013-084612/ ;


NSYSU

22. Lin, I-Hui. Reserch on TPM Program Practice- a case study of SYSCO.

Degree: Master, EMBA, 2003, NSYSU

 At the time of the globalization trend, the rising of Mainland China, and the protection on customs duty being loose after Taiwan joined WTO, the… (more)

Subjects/Keywords: TPM

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lin, I. (2003). Reserch on TPM Program Practice- a case study of SYSCO. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0729103-130814

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Lin, I-Hui. “Reserch on TPM Program Practice- a case study of SYSCO.” 2003. Thesis, NSYSU. Accessed January 23, 2021. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0729103-130814.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Lin, I-Hui. “Reserch on TPM Program Practice- a case study of SYSCO.” 2003. Web. 23 Jan 2021.

Vancouver:

Lin I. Reserch on TPM Program Practice- a case study of SYSCO. [Internet] [Thesis]. NSYSU; 2003. [cited 2021 Jan 23]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0729103-130814.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Lin I. Reserch on TPM Program Practice- a case study of SYSCO. [Thesis]. NSYSU; 2003. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0729103-130814

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Royal Holloway, University of London

23. Yap, Jiun Yi. Identifying trust properties and developing trusted systems for end-to-end trust.

Degree: PhD, 2016, Royal Holloway, University of London

 End-to-end trust is regarded as a game changer for the assurance of distributed and heterogeneous computing environments. It refers to the collection of technologies, user… (more)

Subjects/Keywords: Trusted Computing

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Yap, J. Y. (2016). Identifying trust properties and developing trusted systems for end-to-end trust. (Doctoral Dissertation). Royal Holloway, University of London. Retrieved from https://pure.royalholloway.ac.uk/portal/en/publications/identifying-trust-properties-and-developing-trusted-systems-for-endtoend-trust(aac59546-d62f-458a-908b-c61a4df2a97e).html ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.792577

Chicago Manual of Style (16th Edition):

Yap, Jiun Yi. “Identifying trust properties and developing trusted systems for end-to-end trust.” 2016. Doctoral Dissertation, Royal Holloway, University of London. Accessed January 23, 2021. https://pure.royalholloway.ac.uk/portal/en/publications/identifying-trust-properties-and-developing-trusted-systems-for-endtoend-trust(aac59546-d62f-458a-908b-c61a4df2a97e).html ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.792577.

MLA Handbook (7th Edition):

Yap, Jiun Yi. “Identifying trust properties and developing trusted systems for end-to-end trust.” 2016. Web. 23 Jan 2021.

Vancouver:

Yap JY. Identifying trust properties and developing trusted systems for end-to-end trust. [Internet] [Doctoral dissertation]. Royal Holloway, University of London; 2016. [cited 2021 Jan 23]. Available from: https://pure.royalholloway.ac.uk/portal/en/publications/identifying-trust-properties-and-developing-trusted-systems-for-endtoend-trust(aac59546-d62f-458a-908b-c61a4df2a97e).html ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.792577.

Council of Science Editors:

Yap JY. Identifying trust properties and developing trusted systems for end-to-end trust. [Doctoral Dissertation]. Royal Holloway, University of London; 2016. Available from: https://pure.royalholloway.ac.uk/portal/en/publications/identifying-trust-properties-and-developing-trusted-systems-for-endtoend-trust(aac59546-d62f-458a-908b-c61a4df2a97e).html ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.792577


Linköping University

24. Johansson, Erik. Evaluating performance of a React Native feature set.

Degree: Computer and Information Science, 2018, Linköping University

  React Native has quickly become one of the most popular cross-platform frameworks for developing Android and iOS applications since it was first released by… (more)

Subjects/Keywords: React Native; cross-platform; performance; frames per second; proof of concept; limitations; native module; Engineering and Technology; Teknik och teknologier

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Johansson, E. (2018). Evaluating performance of a React Native feature set. (Thesis). Linköping University. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-148323

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Johansson, Erik. “Evaluating performance of a React Native feature set.” 2018. Thesis, Linköping University. Accessed January 23, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-148323.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Johansson, Erik. “Evaluating performance of a React Native feature set.” 2018. Web. 23 Jan 2021.

Vancouver:

Johansson E. Evaluating performance of a React Native feature set. [Internet] [Thesis]. Linköping University; 2018. [cited 2021 Jan 23]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-148323.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Johansson E. Evaluating performance of a React Native feature set. [Thesis]. Linköping University; 2018. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-148323

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Waterloo

25. Juliato, Marcio. Fault Tolerant Cryptographic Primitives for Space Applications.

Degree: 2011, University of Waterloo

 Spacecrafts are extensively used by public and private sectors to support a variety of services. Considering the cost and the strategic importance of these spacecrafts,… (more)

Subjects/Keywords: Security; Cryptography; Fault Tolerance; Trusted Platform; Space Systems; Hash Functions; Secure Hash Algorithm; SHA-2; Keyed-Hash Message Authentication Code; HMAC; Hardware Implementation; FPGA; Application Specific Processor; Custom Instruction; HW/SW Partitioning

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Juliato, M. (2011). Fault Tolerant Cryptographic Primitives for Space Applications. (Thesis). University of Waterloo. Retrieved from http://hdl.handle.net/10012/5876

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Juliato, Marcio. “Fault Tolerant Cryptographic Primitives for Space Applications.” 2011. Thesis, University of Waterloo. Accessed January 23, 2021. http://hdl.handle.net/10012/5876.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Juliato, Marcio. “Fault Tolerant Cryptographic Primitives for Space Applications.” 2011. Web. 23 Jan 2021.

Vancouver:

Juliato M. Fault Tolerant Cryptographic Primitives for Space Applications. [Internet] [Thesis]. University of Waterloo; 2011. [cited 2021 Jan 23]. Available from: http://hdl.handle.net/10012/5876.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Juliato M. Fault Tolerant Cryptographic Primitives for Space Applications. [Thesis]. University of Waterloo; 2011. Available from: http://hdl.handle.net/10012/5876

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

26. Pogorevc, Simon. RAZVOJ INTELIGENTNEGA OKOLJA ZA PAMETNI DOM NA PLATFORMI ARM.

Degree: 2013, Univerza v Mariboru

Magistrska naloga najprej poda pregled sistemov za inteligentni dom, kot jih dandanes že poznamo. V nadaljevanju podajamo zasnovo inteligentnega okolja za pametni dom na ARM… (more)

Subjects/Keywords: inteligentno okolje; pametni dom; ARM platforma; XBee modul; ZigBee tehnologija; intelligent environment; smart home; ARM platform; XBee module; ZigBee technology; info:eu-repo/classification/udc/621.38:004.896(043.2)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Pogorevc, S. (2013). RAZVOJ INTELIGENTNEGA OKOLJA ZA PAMETNI DOM NA PLATFORMI ARM. (Masters Thesis). Univerza v Mariboru. Retrieved from https://dk.um.si/IzpisGradiva.php?id=42658 ; https://dk.um.si/Dokument.php?id=60094&dn= ; https://plus.si.cobiss.net/opac7/bib/17541398?lang=sl

Chicago Manual of Style (16th Edition):

Pogorevc, Simon. “RAZVOJ INTELIGENTNEGA OKOLJA ZA PAMETNI DOM NA PLATFORMI ARM.” 2013. Masters Thesis, Univerza v Mariboru. Accessed January 23, 2021. https://dk.um.si/IzpisGradiva.php?id=42658 ; https://dk.um.si/Dokument.php?id=60094&dn= ; https://plus.si.cobiss.net/opac7/bib/17541398?lang=sl.

MLA Handbook (7th Edition):

Pogorevc, Simon. “RAZVOJ INTELIGENTNEGA OKOLJA ZA PAMETNI DOM NA PLATFORMI ARM.” 2013. Web. 23 Jan 2021.

Vancouver:

Pogorevc S. RAZVOJ INTELIGENTNEGA OKOLJA ZA PAMETNI DOM NA PLATFORMI ARM. [Internet] [Masters thesis]. Univerza v Mariboru; 2013. [cited 2021 Jan 23]. Available from: https://dk.um.si/IzpisGradiva.php?id=42658 ; https://dk.um.si/Dokument.php?id=60094&dn= ; https://plus.si.cobiss.net/opac7/bib/17541398?lang=sl.

Council of Science Editors:

Pogorevc S. RAZVOJ INTELIGENTNEGA OKOLJA ZA PAMETNI DOM NA PLATFORMI ARM. [Masters Thesis]. Univerza v Mariboru; 2013. Available from: https://dk.um.si/IzpisGradiva.php?id=42658 ; https://dk.um.si/Dokument.php?id=60094&dn= ; https://plus.si.cobiss.net/opac7/bib/17541398?lang=sl


Brno University of Technology

27. Malinčík, Ondrej. Otevřená platforma mobilního telefonu: The open mobile phone platform.

Degree: 2019, Brno University of Technology

 The aim of this work is construction of mobile phone which can be build using com- ponents that are widely available. The concept allows control… (more)

Subjects/Keywords: otvorená; platforma; mobilný; telefón; GSM; modul; AT; príkaz; PIC; správa; napájania; solárny; článok; MPPT; open; mobile; phone; platform; GSM; module; AT; command; PIC; power; management; solar; cell; MPPT

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Malinčík, O. (2019). Otevřená platforma mobilního telefonu: The open mobile phone platform. (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/40255

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Malinčík, Ondrej. “Otevřená platforma mobilního telefonu: The open mobile phone platform.” 2019. Thesis, Brno University of Technology. Accessed January 23, 2021. http://hdl.handle.net/11012/40255.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Malinčík, Ondrej. “Otevřená platforma mobilního telefonu: The open mobile phone platform.” 2019. Web. 23 Jan 2021.

Vancouver:

Malinčík O. Otevřená platforma mobilního telefonu: The open mobile phone platform. [Internet] [Thesis]. Brno University of Technology; 2019. [cited 2021 Jan 23]. Available from: http://hdl.handle.net/11012/40255.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Malinčík O. Otevřená platforma mobilního telefonu: The open mobile phone platform. [Thesis]. Brno University of Technology; 2019. Available from: http://hdl.handle.net/11012/40255

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

28. Cordeiro, Joana Margarida Bento. Lean manufacturing implementation in filling and distribution process in Lactogal, Produtos Alimentares .

Degree: 2020, Universidade de Aveiro

 Nowadays, the technological evolution is unleashing big changes inside organizations, directly affecting their operational environment. Therefore, these new dynamics have been playing a role to… (more)

Subjects/Keywords: Lean; OEE; 5S; TPM

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Cordeiro, J. M. B. (2020). Lean manufacturing implementation in filling and distribution process in Lactogal, Produtos Alimentares . (Thesis). Universidade de Aveiro. Retrieved from http://hdl.handle.net/10773/29025

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Cordeiro, Joana Margarida Bento. “Lean manufacturing implementation in filling and distribution process in Lactogal, Produtos Alimentares .” 2020. Thesis, Universidade de Aveiro. Accessed January 23, 2021. http://hdl.handle.net/10773/29025.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Cordeiro, Joana Margarida Bento. “Lean manufacturing implementation in filling and distribution process in Lactogal, Produtos Alimentares .” 2020. Web. 23 Jan 2021.

Vancouver:

Cordeiro JMB. Lean manufacturing implementation in filling and distribution process in Lactogal, Produtos Alimentares . [Internet] [Thesis]. Universidade de Aveiro; 2020. [cited 2021 Jan 23]. Available from: http://hdl.handle.net/10773/29025.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Cordeiro JMB. Lean manufacturing implementation in filling and distribution process in Lactogal, Produtos Alimentares . [Thesis]. Universidade de Aveiro; 2020. Available from: http://hdl.handle.net/10773/29025

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Uppsala University

29. Bemler, Daniel. Visualisering av produktionseffektivitet : Utveckling av ett verktyg för övervakningav avbrott och presentation av TAK.

Degree: Industrial Engineering & Management, 2011, Uppsala University

Many companies do not register all the stops that occur in a production plant, it often takes longer to report than to fix the… (more)

Subjects/Keywords: TAK; produktionseffektivitet; TPM; processövervakning

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Bemler, D. (2011). Visualisering av produktionseffektivitet : Utveckling av ett verktyg för övervakningav avbrott och presentation av TAK. (Thesis). Uppsala University. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-157124

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Bemler, Daniel. “Visualisering av produktionseffektivitet : Utveckling av ett verktyg för övervakningav avbrott och presentation av TAK.” 2011. Thesis, Uppsala University. Accessed January 23, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-157124.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Bemler, Daniel. “Visualisering av produktionseffektivitet : Utveckling av ett verktyg för övervakningav avbrott och presentation av TAK.” 2011. Web. 23 Jan 2021.

Vancouver:

Bemler D. Visualisering av produktionseffektivitet : Utveckling av ett verktyg för övervakningav avbrott och presentation av TAK. [Internet] [Thesis]. Uppsala University; 2011. [cited 2021 Jan 23]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-157124.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Bemler D. Visualisering av produktionseffektivitet : Utveckling av ett verktyg för övervakningav avbrott och presentation av TAK. [Thesis]. Uppsala University; 2011. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-157124

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

30. Solsjö, Oskar. Secure key management in a trusted domain on mobile devices.

Degree: Faculty of Science & Engineering, 2015, Linköping UniversityLinköping University

  As mobile devices manage more and more sensitive information they have become a more targeted platform to exploit. To maintain system integrity while providing… (more)

Subjects/Keywords: TPM; TEE; Common Criteria; Evaluation

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Solsjö, O. (2015). Secure key management in a trusted domain on mobile devices. (Thesis). Linköping UniversityLinköping University. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-118501

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Solsjö, Oskar. “Secure key management in a trusted domain on mobile devices.” 2015. Thesis, Linköping UniversityLinköping University. Accessed January 23, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-118501.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Solsjö, Oskar. “Secure key management in a trusted domain on mobile devices.” 2015. Web. 23 Jan 2021.

Vancouver:

Solsjö O. Secure key management in a trusted domain on mobile devices. [Internet] [Thesis]. Linköping UniversityLinköping University; 2015. [cited 2021 Jan 23]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-118501.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Solsjö O. Secure key management in a trusted domain on mobile devices. [Thesis]. Linköping UniversityLinköping University; 2015. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-118501

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

[1] [2] [3] [4] [5] … [115]

.