Gallery, Eimear M and Mitchell, Chris J (2009) Trusted computing: Security and applications. Cryptologia, 33
Full text access: Open
This is a Submitted version This version's date is: 2009 This item is not peer reviewed
https://repository.royalholloway.ac.uk/items/31364a88-2c71-243e-ccbf-d25d26a01e3a/1/
Deposited by Research Information System (atira) on 24-May-2012 in Royal Holloway Research Online.Last modified on 24-May-2012