Computer Science ›› 2008, Vol. 35 ›› Issue (3): 271-273.

Previous Articles     Next Articles

  

  • Online:2018-11-16 Published:2018-11-16

Abstract: The main function of trusted computing is done by the trusted platform module. For the working of TPM is based on the OIAP and OSAP protocol, it is most important to ensure the secure working of the two protocols. This article does logic description and s

Key words: Trusted computing, Trusted platform module, Authorization protocol

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!