Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
×
In this paper we identify three specific problem areas in the MTM specification and discuss possible solutions. The first problem arises from the need to ...
ABSTRACT. Technologies that enable trusted computing in embedded systems such as cell phones, PDAs, or set top boxes have.
In the present paper we discuss some issues that arise when implementing TCG-compliant trusted computing on mobile or embedded devices. In particular, we ...
In this paper we identify three specific problem areas in the MTM specification and discuss possible solutions. The first problem arises from the need to ...
Bibliographic details on Reassessing the TCG Specifications for Trusted Computing in Mobile and Embedded Systems.
click to vote. more HOST 2008 ... Copyright. home · flag · www.cs.bris.ac.uk · close. Please Wait ... Downloading Document from Author's Website.
Reassessing the TCG specifications for trusted computing in mobile and embedded systems ... trusted computing base of embedded systems. It gives an overview of ...
People also ask
TCG Mobile Trusted Module Specification. FAQ, Historical Document, Specification. Latest Version. TCG Mobile Trusted Module Specification Version 1.0 Revision ...
Missing: Reassessing | Show results with:Reassessing
Reassessing the TCG specifications for trusted computing in mobile and embedded systems pp. 84-90. Extended abstract: Trustworthy system security through 3-D ...
This paper proposes a thorough overview of processor-based solutions to protect programs and data exchanges within embedded systems and discusses the ...