Clear, practical tutorial style text with real-world applications First book on TPM for embedded designers Provides a sound foundation on the TPM, helping designers take advantage of hardware security based on sound TCG standards Covers all the TPM basics, discussing in detail the TPM Key Hierarchy and the Trusted Platform Module specification Presents a methodology to enable designers and developers to successfully integrate the TPM into an embedded design and verify the TPM's operation on a specific platform This sound foundation on the TPM provides clear, practical tutorials with detailed real-world application examples The author is reknowned for training embedded systems developers to successfully implement the TPM worldwide
Intended for embedded designers, this book provides a foundation on the TPM, helping designers take advantage of hardware security based on sound TCG standards.
It shows security and TPM concepts, demonstrating their use in real applications that the reader can try out. Simply put, this book is designed to empower and excite the programming community to go out and do cool things with the TPM.
Cognitive radio technology is a smarter, faster, and more efficient way to transmit information to and from fixed, mobile, other wireless communication devices. Cognitive radio builds upon software-defined radio technology....
In this book the authors first describe the background of trusted platforms and trusted computing and speculate about the future.
"This book is a must have resource guide for anyone who wants to ... implement TXT within their environments.
Other product or company names mentioned herein are the trademarks or registered trademarks of their respective owners . ... Printed in the United States of America 10 9 8 7 6 5 4 3 2 ISBN 0-13-009220-7 Pearson Education LTD .
Busch, H., Sot ́akov ́a, M., Katzenbeisser, S., Sion, R.: The PUF promise. In: Proceedings of the International Conference on Trust and Trustworthy Computing (2010) (Referenced on page 39.) Bussani, A., Griffin, J.L., Jansen, B., ...
By the end of the book the reader should be able to play an educated role in a smart card related project, even to programming a card application. This book is designed as a textbook for graduate level students in computer science.
SUPPORT AND UPGRADES Secure coprocessors, like any other device that hosts a CPU and various other security modules, will require the application of upgrades, bug fixes, and patches from time to time. Such upgrades need to be enabled ...
Algorithmic Strategies for Solving Complex Problems in Cryptography is an essential reference source that discusses the evolution and current trends in cryptology, and it offers new insight into how to use strategic algorithms to aid in ...