Login / Signup
Building General Purpose Security Services on Trusted Computing.
Chunhua Chen
Chris J. Mitchell
Shaohua Tang
Published in:
INTRUST (2011)
Keyphrases
</>
security services
trusted computing
security protocols
key management
computing environments
security mechanisms
computing platform
personal information
computer security
database
databases
database systems
software architecture
trusted platform module