You are not authenticated through an institution. Should you have institutional access?
Here's how to get it
Chapter
Licensed
Unlicensed
Requires Authentication
4. Trusted Software Stack
-
Dengguo Feng
Dengguo FengSearch for this author in:
You are currently not able to access this content.
Not sure if you should have access? Please log in using an institutional account to see if you have access to view or download this content.
You are currently not able to access this content.
Not sure if you should have access? Please log in using an institutional account to see if you have access to view or download this content.
Chapters in this book
- Frontmatter I
- Preface V
- Contents VII
- 1. Introduction 1
- 2. Trusted Platform Module 18
- 3. Building Chain of Trust 66
- 4. Trusted Software Stack 100
- 5. Trusted Computing Platform 133
- 6. Test and Evaluation of Trusted Computing 168
- 7. Remote Attestation 197
- 8. Trust Network Connection 243
- Appendix A: Foundations of Cryptography 265
- References 289
- Index 299
Readers are also interested in:
Chapters in this book
- Frontmatter I
- Preface V
- Contents VII
- 1. Introduction 1
- 2. Trusted Platform Module 18
- 3. Building Chain of Trust 66
- 4. Trusted Software Stack 100
- 5. Trusted Computing Platform 133
- 6. Test and Evaluation of Trusted Computing 168
- 7. Remote Attestation 197
- 8. Trust Network Connection 243
- Appendix A: Foundations of Cryptography 265
- References 289
- Index 299