Login / Signup
Defending Hardware-based Attacks on Trusted Computing using a Hardware-Integrity Attestation Protocol.
Anna Mpanti
Stavros D. Nikolopoulos
Iosif Polenakis
Published in:
CompSysTech (2017)
Keyphrases
</>
trusted computing
computer security
computing platform
computing environments
remote attestation
virtual organization
cloud computing
trusted platform module
database
lightweight
computing systems
low cost
computer systems
access control policies