Login / Signup
Hierarchical-CPK-Based Trusted Computing Cryptography Scheme.
Fajiang Yu
Tong Li
Yang Lin
Huanguo Zhang
Published in:
ATC (2011)
Keyphrases
</>
trusted computing
computing environments
trusted platform module
computing platform
database
case study
message passing
computer security