This book constitutes the thoroughly refereed post-conference proceedings of the First International Conference on Trusted Computing and Trust in Information Te
From early prototypes and proposed applications, this book surveys the longer history of amplifying small amounts of hardware security into broader system secur
The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile modules, chain of trust, trusted software stack etc, and discusses th
This book describes the state-of-the-art in trusted computing for embedded systems. It shows how a variety of security and trusted computing problems are addres
In this book the authors first describe the background of trusted platforms and trusted computing and speculate about the future. They then describe the technic