Sign in

Hierarchical-CPK-Based Trusted Computing Cryptography Scheme.

Fajiang YuTong LiYang LinHuanguo Zhang
Published in: ATC (2011)
Keyphrases
  • trusted computing
  • computing environments
  • trusted platform module
  • computing platform
  • database
  • case study
  • message passing
  • computer security