Publisher
Springer Berlin Heidelberg
Reference7 articles.
1. Felten EW (2003) Understanding trusted computing: will its benefits outweigh its drawbacks? Secur Privacy IEEE 1(3):60–62
2. Grawrock D (2008) Dynamics of a trusted platform. Intel Press, Hillsboro
3. Mao W (2009) Innovations for grid security from trusted computing. In: Christianson B, Crispo B, Malcolm JA, Roe M (eds) Security protocols. Lecture notes in computer science, vol 5087. Springer, Berlin/Heidelberg, pp 150–152
4. Parno B, McCune J, Perrig A (2010, May 16–19) Bootstrapping trust in commodity computers. In: 2010 IEEE symposium on security and privacy (SP). pp 414–429
5. Potter B (2009) High time for trusted computing. Secur Privacy IEEE 7(6):54–56