Trust Extension as a Mechanism for Secure Code Execution on Commodity Computers More Books Like This

Trusted Computing - Challenges and Applications Trusted Computing - Challenges and Applications
2008
Bootstrapping Trust in Modern Computers Bootstrapping Trust in Modern Computers
2011
Trusted Computing Trusted Computing
2009
Security and Privacy in Mobile Information and Communication Systems Security and Privacy in Mobile Information and Communication Systems
2009
Platform Embedded Security Technology Revealed Platform Embedded Security Technology Revealed
2014
Research in Attacks, Intrusions, and Defenses Research in Attacks, Intrusions, and Defenses
2017
Research in Attacks, Intrusions, and Defenses Research in Attacks, Intrusions, and Defenses
2016
Future of Trust in Computing Future of Trust in Computing
2009
Design and Analysis of Security Protocol for Communication Design and Analysis of Security Protocol for Communication
2020
Emerging Technologies for Authorization and Authentication Emerging Technologies for Authorization and Authentication
2020
Cybersecurity Cybersecurity
2022
Research in Attacks, Intrusions, and Defenses Research in Attacks, Intrusions, and Defenses
2015
Security in Fixed and Wireless Networks Security in Fixed and Wireless Networks
2016
Detection of Intrusions and Malware, and Vulnerability Assessment Detection of Intrusions and Malware, and Vulnerability Assessment
2009
Moving Target Defense Moving Target Defense
2011