His main research concerns Computer security, Trusted Platform Module, Operating system, Key and Public-key cryptography. Computer security connects with themes related to Data processing system in his study. His research integrates issues of Software and Code in his study of Trusted Platform Module.
In most of his Operating system studies, his work intersects topics such as Real-time computing. His biological study spans a wide range of topics, including Trusted Computing and Human–computer interaction. His study looks at the relationship between Encryption and fields such as Cryptographic protocol, as well as how they intersect with chemical problems.
His primary areas of study are Computer security, Computer hardware, Operating system, Computer network and Password. His study in Public-key cryptography, Encryption, Trusted Platform Module, Trusted Computing and Key falls within the category of Computer security. His work on Key distribution as part of general Public-key cryptography research is frequently linked to Certificate, thereby connecting diverse disciplines of science.
The Computer hardware study combines topics in areas such as Reset, Embedded system and Laptop. His Database research extends to Operating system, which is thematically connected. David Carroll Challener has researched Password in several fields, including Data access and Linkage.
His primary scientific interests are in Computer security, Operating system, Software, Password and Computer hardware. The study of Computer security is intertwined with the study of Process in a number of ways. In Operating system, David Carroll Challener works on issues like Key, which are connected to Set.
His Software study incorporates themes from Hash function, State, Authorization and Code. His work on Password policy as part of general Password research is frequently linked to Group Policy, bridging the gap between disciplines. His Computer hardware study combines topics in areas such as Battery, One-time password and Laptop.
David Carroll Challener mostly deals with Operating system, Computer security, Computer hardware, Software and Cataloging. His research in Operating system intersects with topics in Key and Decodes. His research in the fields of Trusted Platform Module and Code overlaps with other disciplines such as Architecture and Deep dive.
His study in the fields of CPU power dissipation under the domain of Computer hardware overlaps with other disciplines such as Group Policy. The concepts of his Software study are interwoven with issues in Password, Process, Password policy and SIMPLE. His studies deal with areas such as Information retrieval and User requirements document as well as Cataloging.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
A Practical Guide to Trusted Computing
David Challener;Kent Yoder;Ryan Catherman;David Safford.
Encrypted file system using TCPA
David Carroll Challener;David Robert Safford.
Method and system for secure computer moderated voting
David C. Challener;Richard A. Kelley;Palmer E. Newman.
System and method for reporting the trusted state of a virtual machine
David Carroll Challener;Mark Charles Davis.
Autonomic personal computing
D. F. Bantz;C. Bisdikian;D. Challener;J. P. Karidis.
Ibm Systems Journal (2003)
Method and system for automated migration of user settings to a replacement computer system
Barry Douglas Atkins;David Carroll Challener;Richard Wayne Cheston.
Business method for secure installation of a credit authorization key on a remote tcpa compliant system
Distributed autonomic backup
David Frederick Bantz;David Carroll Challener;John Peter Karidis.
A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security
Will Arthur;David Challener.
Method and system for password protection of a data processing system that permit a user-selected password to be recovered
David Carroll Challener;Mohammad Peyravian;Russell Alan Resnick.
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below: