Chris J. Mitchell Trusted computing: putting a security module on every desktop.
Full text access: Open
This is a version This version's date is: This item is not peer reviewed
https://repository.royalholloway.ac.uk/items/3ba0836c-696a-2445-fab5-fce168dfd72f/1/
Deposited by () on 23-Dec-2009 in Royal Holloway Research Online.Last modified on 21-May-2010