Login / Signup
Using trusted computing in trusted mail transfer protocol.
Fady A. Mohamed
Elsayed E. Hemayed
Published in:
Secur. Commun. Networks (2014)
Keyphrases
</>
trusted computing
computing environments
computing platform
remote attestation
computer security
cloud computing
trusted platform module
virtual organization
lightweight
databases
low cost
parallel computing
security protocols