Linked e-resources
Details
Table of Contents
Introduction to Trusted Computing
Futures for Trusted Computing
Basics of Trusted Platforms
Trusted Platform Architecture
TPM2 Requirements
TPM2 Operation
Initialising TPM2
Managing TPM2
Accessing Keys and Data in TPM2
Customer Configuration of TPM2 and Its Host Platform
Starting to Use TPM2
Direct Anonymous Attestation (DAA) in More Depth
Machine Virtualisation, Virtual Machines, and TPMs
Index.
Futures for Trusted Computing
Basics of Trusted Platforms
Trusted Platform Architecture
TPM2 Requirements
TPM2 Operation
Initialising TPM2
Managing TPM2
Accessing Keys and Data in TPM2
Customer Configuration of TPM2 and Its Host Platform
Starting to Use TPM2
Direct Anonymous Attestation (DAA) in More Depth
Machine Virtualisation, Virtual Machines, and TPMs
Index.