Login / Signup
Reflections on Post-Meltdown Trusted Computing: A Case for Open Security Processors.
Jan Tobias Mühlberg
Jo Van Bulck
Published in:
login Usenix Mag. (2018)
Keyphrases
</>
trusted computing
computer security
computing environments
trusted platform module
computing platform
remote attestation
cloud computing
parallel computing
factor authentication
virtual organization
security issues
web services
information security
fine grained
computer systems
wireless sensor networks
case study