![]() |
Volumn 27, Issue 6, 2007, Pages 25-35
|
Where does security stand? New vulnerabilities vs. trusted computing
a
|
Author keywords
[No Author keywords available]
|
Indexed keywords
COMPUTER HARDWARE;
COMPUTER SOFTWARE;
FIRMWARE;
SECURITY OF DATA;
COMPUTER ARCHITECTURAL INNOVATIONS;
SECURITY VULNERABILITIES;
COMPUTER ARCHITECTURE;
|
EID: 39849091652
PISSN: 02721732
EISSN: None
Source Type: Journal
DOI: 10.1109/MM.2007.112 Document Type: Article |
Times cited : (5)
|
References (6)
|