Trusted computing

89Citations
Citations of this article
107Readers
Mendeley users who have this article in their library.
Get full text

Abstract

This book provides an introduction to trusted computing technology and its applications. As computers are increasingly embedded and wireless connected, security becomes imperative.

Cite

CITATION STYLE

APA

Mitchell, C. (2005). Trusted computing. Trusted Computing (pp. 1–314). Institution of Engineering and Technology. https://doi.org/10.1049/PBPC006E

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free