Trusted Computing Platforms: Design and Applications
How can one trust computation taking place at a remote site, particularly if a party at that site might have motivation to subvert this trust? In recent years, industrial efforts have advanced the notion of a "trusted computing platform" as a building block. Through a conspiracy of hardwar...
| Main Author: | Smith, Sean W. (Author) |
|---|---|
| Corporate Author: | SpringerLink (Online service) |
| Format: | Electronic eBook |
| Language: | English |
| Published: |
Boston, MA :
Springer US,
2005.
|
| Subjects: | |
| Online Access: | Full Text via HEAL-Link |
Similar Items
-
Trusted Computing Platforms: Design and Applications
by: Smith, Sean W.
Published: (2005) -
Computer Security in the 21st Century
Published: (2005) -
Moving Target Defense II Application of Game Theory and Adversarial Modeling /
Published: (2013) -
Secure Group Communications over Data Networks
by: Zou, Xukai, et al.
Published: (2005) -
Emerging Challenges for Security, Privacy and Trust 24th IFIP TC 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18–20, 2009. Proceedings /
Published: (2009)