This book provides an introduction to trusted computing technology and its applications. As computers are increasingly embedded and wireless connected, security becomes imperative.
CITATION STYLE
Mitchell, C. (2005). Trusted computing. Trusted Computing (pp. 1–314). Institution of Engineering and Technology. https://doi.org/10.1049/PBPC006E
Mendeley helps you to discover research relevant for your work.