A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Enforced Conviction in Cryptographic Provenance Across Critical System Information
unpublished
This project's aim is to describe two application, first one is keystroke integrity verification and secondly, malicious traffic detection or traffic monitoring. In this project we design and implement a cryptographic protocol that impose keystroke integrity by utilizing trusted computing platform and this approach helps to restrict outbound malware traffic. Trusted platform module is an international standard for secure crypto-processor. It offers facilities for the secure generation of
fatcat:igoxr6qgqzaxdoeh6zkndo452y