Login / Signup
In Search of Trust: 30 Years of Evolution of Trusted Computing and Hardware Security.
Claire Vishik
Published in:
ASHES@CCS (2023)
Keyphrases
</>
trusted computing
computing environments
computing platform
computer security
remote attestation
trusted platform module
virtual organization
cloud computing
intrusion detection
information security
access control policies
data storage
factor authentication