<--- Back to Details
First PageDocument Content
Computer security / Computing / Trusted computing / Cryptography / Windows Vista / Trusted Computing Group / Next-Generation Secure Computing Base / Grid computing / Proxy server / Rootkit / Virtualization / Hardware virtualization
Date: 2012-01-05 23:25:04
Computer security
Computing
Trusted computing
Cryptography
Windows Vista
Trusted Computing Group
Next-Generation Secure Computing Base
Grid computing
Proxy server
Rootkit
Virtualization
Hardware virtualization

information security technical report–138 available at www.sciencedirect.com www.compseconline.com/publications/prodinf.htm

Document is deleted from original location.
Use the Download Button below to download from the Web Archive.

Download Document from Web Archive

File Size: 521,83 KB