Computer Science ›› 2008, Vol. 35 ›› Issue (3): 271-273.
Previous Articles Next Articles
Online:
Published:
Abstract: The main function of trusted computing is done by the trusted platform module. For the working of TPM is based on the OIAP and OSAP protocol, it is most important to ensure the secure working of the two protocols. This article does logic description and s
Key words: Trusted computing, Trusted platform module, Authorization protocol
0 / / Recommend
Add to citation manager EndNote|Reference Manager|ProCite|BibTeX|RefWorks
URL: https://www.jsjkx.com/EN/
https://www.jsjkx.com/EN/Y2008/V35/I3/271
Cited