Date: 2012-01-05 23:25:04Computer security Computing Trusted computing Cryptography Windows Vista Trusted Computing Group Next-Generation Secure Computing Base Grid computing Proxy server Rootkit Virtualization Hardware virtualization | | information security technical report–138 available at www.sciencedirect.com www.compseconline.com/publications/prodinf.htmDocument is deleted from original location. Use the Download Button below to download from the Web Archive.Download Document from Web Archive File Size: 521,83 KB
|