More Books:

A Practical Guide to TPM 2.0
Language: un
Pages: 392
Authors: Will Arthur, David Challener
Categories: Computers
Type: BOOK - Published: 2015-01-28 - Publisher: Apress

A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security is a straight-forward primer for developers. It shows security and TPM concepts, demonstrating their use in real applications that the reader can try out. Simply put, this book is designed to empower and
Trusted Platform Modules
Language: un
Pages: 400
Authors: Ariel Segall
Categories: Computers
Type: BOOK - Published: 2016-11-23 - Publisher: IET

Trusted Platform Modules (TPMs) are small, inexpensive chips which provide a limited set of security functions. They are most commonly found as a motherboard component in laptops and desktops aimed at the corporate or government markets, but can also be found in many consumer-grade machines and servers or purchased as
A Comparison Between Smart Cards and Trusted Platform Modules in Business Scenarios
Language: un
Pages: 167
Authors: Martin W. Murhammer
Categories: Computer security
Type: BOOK - Published: 2008 - Publisher: Diplomica Verlag Gmbh

This thesis focuses on the area of authentication and machine binding using either smart card or trusted platform module (TPM) technology, or a combination thereof. It is the major objective to demonstrate the value of each of these technologies based upon selected business scenarios. Underlying trust models and architectural requirements
Key Management with Trusted Platform Modules
Language: un
Pages: 61
Authors: Martin W. Murhammer
Categories: Computer security
Type: BOOK - Published: 2006 - Publisher:

Books about Key Management with Trusted Platform Modules
Trusted Computing
Language: un
Pages: 311
Authors: Dengguo Feng
Categories: Computers
Type: BOOK - Published: 2017-12-18 - Publisher: Walter de Gruyter GmbH & Co KG

The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile modules, chain of trust, trusted software stack etc, and discusses the configuration of trusted platforms and network connections. It also emphasizes the application of such technologies in practice, extending readers from computer science and information science