|
|
|
|
LEADER |
01997nam a2200289 a 4500 |
001 |
1905787 |
005 |
20171111234742.0 |
008 |
070308s2006 enk o 000 0 eng d |
020 |
|
|
|a 9780080465166
|q (electronic bk.)
|
020 |
|
|
|a 0080465161
|q (electronic bk.)
|
020 |
|
|
|a 9780750679602
|
020 |
|
|
|a 0750679603
|
040 |
|
|
|a N$T
|b eng
|e pn
|
050 |
|
4 |
|a TK7895.E42
|b K56 2006eb
|
100 |
1 |
|
|a Kinney, Steven.
|
245 |
1 |
0 |
|a Trusted platform module basics :
|b using TPM in embedded systems /
|c Steven L. Kinney.
|
260 |
|
|
|a Oxford :
|b Newnes,
|c 2006.
|
300 |
|
|
|a 1 online resource (xv, 352 pages).
|
490 |
1 |
|
|a Embedded technology series
|
505 |
0 |
|
|a TCG prerequisites -- Cryptographic basics -- Overview of the TPM architecture -- Root-of-trust, the TPM endorsement key -- Key hierarchy and key management -- Platform configuration registers -- TPM command message overview -- Rolling nonces and anti-replay protection -- Command authorization, typical -- Command authorization, atypical -- The initialization and low-level command suite -- Compliance vectors and their purpose -- Establishing a TPM owner -- Owner-authorized command suite -- The key management command suite -- The RSA encryption and decryption command suite -- The TPM signature command -- The RNG command suite -- The PCR command suite -- The TPM capability and self-test command suite -- The key migration and secret management suite -- The trusted device driver -- TPM system deployment initialization -- Migrating to version 1.2 of the TPM -- Example one : TPM ownership -- More command examples.
|
650 |
|
0 |
|a Embedded computer systems.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
7 |
|a COMPUTERS
|x Hardware
|x Personal Computers
|x Macintosh.
|
650 |
|
7 |
|a COMPUTERS
|x Hardware
|x Personal Computers
|x PCs.
|
650 |
|
7 |
|a Computer security.
|
856 |
4 |
0 |
|a Embedded computer systems.
|u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=173590
|
952 |
|
|
|a CY-NiOUC
|b 5a04669f6c5ad14ac1eef331
|c 998a
|d 945l
|e -
|t 1
|x m
|z Books
|