Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
10.7 Further Reading
E. Felten. Understanding Trusted Computing. IEEE Security and Privacy, pages 60–62, May/June 2003.
J. Marchesini, S.W. Smith, O. Wild, and R. Macdonald. Experimenting with TCPA/TCG Hardware, Or: How I Learned to Stop Worrying and Love The Bear. Technical Report TR2003-476, Dartmouth College Department of Computer Science, December 2003.
S. Pearson, editor. Trusted Computing Platforms: TCPA Technology in Context. Prentice Hall, 2003.
F. Schneider. Secure Systems Conundrum. Communications of the ACM, 45(10): 160, October 2002.
Trusted Computing Group. TCG Specification Architecture Overview, http://www.trustedcomputinggroup.org, April 2004. Specification Revision 1.2.
Rights and permissions
Copyright information
© 2005 Springer Science + Business Media, Inc.
About this chapter
Cite this chapter
(2005). TCPA/TCG. In: Trusted Computing Platforms: Design and Applications. Springer, Boston, MA. https://doi.org/10.1007/0-387-23917-0_10
Download citation
DOI: https://doi.org/10.1007/0-387-23917-0_10
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-23916-3
Online ISBN: 978-0-387-23917-0
eBook Packages: Computer ScienceComputer Science (R0)