This paper assesses how trusted computing technology can enhance privacy, both in the short and long term, and provides a variety of examples. In addition, potential negative privacy implications are assessed and outstanding issues are highlighted that need to be addressed before trusted computing could be provided in a privacy-friendly manner within the consumer space. © Springer-Verlag Berlin Heidelberg 2005.
CITATION STYLE
Pearson, S. (2005). Trusted computing: Strengths, weaknesses and further opportunities for enhancing privacy. In Lecture Notes in Computer Science (Vol. 3477, pp. 305–320). Springer Verlag. https://doi.org/10.1007/11429760_21
Mendeley helps you to discover research relevant for your work.