Cited By
View all- Kuntze NRudolph CLeivesley SManz DEndicott-Popovsky B(2014)Resilient core networks for energy distribution2014 IEEE PES General Meeting | Conference & Exposition10.1109/PESGM.2014.6939164(1-5)Online publication date: Jul-2014
Trusted Computing offer great opportunities to enhance security and privacy of the user. Trusted Platform Module (TPM) is the implementation of the trusted platform initiatives on a chip under Trusted Computing Group (TCG). The TPM chip that is similar ...
Trusted computing is an important research field in information security and trust evaluation for trust model is the key issue to be resolved. It is great significance for ensuring security of trust model for trusted computing to analyze normally and ...
Security of information in computers is of paramount importance. Considering the software security as inadequate, hardware rooted security standards were developed as Trusted Platform Module (TPM) 1.0 in 2003 and subsequently as TPM 2.0 in 2012. ...
Association for Computing Machinery
New York, NY, United States
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in