Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
4.5 Further Reading
W. Arbaugh, D. Farber, and J. Smith. A Secure and Reliable Bootstrap Architecture. In Proceedings of the 1997 Symposium on Security and Privacy, pages 65–71. IEEE, 1997.
J.D. Tygar, B.S. Yee, and N. Heintze. cryptographic Postage Indicia. In Asian Computing Science Conference, pages 378–391, 1996.
S.H. Weingart. Physical Security for the μABYSS System. In Proceedings of the 1987 Symposium on Security and Privacy, pages 52–59. IEEE, 1987.
S. White, S.H. Weingart, W. Arnold, and E.R. Palmer. Introduction to the Citadel Architecture: Security in Physically Exposed Environments. Technical Report RC16672, IBM T.J. Watson Research Center, 1991.
B.S. Yee. Using Secure Coprocessors. PhD thesis, Carnegie Mellon University, May 1994. Page numbers refer to the 2E version.
Rights and permissions
Copyright information
© 2005 Springer Science + Business Media, Inc.
About this chapter
Cite this chapter
(2005). Foundations. In: Trusted Computing Platforms: Design and Applications. Springer, Boston, MA. https://doi.org/10.1007/0-387-23917-0_4
Download citation
DOI: https://doi.org/10.1007/0-387-23917-0_4
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-23916-3
Online ISBN: 978-0-387-23917-0
eBook Packages: Computer ScienceComputer Science (R0)