![Cryptography / Computer security / Logger / Data / Logfile / Public-key cryptography / Log analysis / Trusted computing / Disk encryption / Trusted Platform Module Cryptography / Computer security / Logger / Data / Logfile / Public-key cryptography / Log analysis / Trusted computing / Disk encryption / Trusted Platform Module](https://www.pdfsearch.io/img/95c18a6b518df28785f0873afdef5143.jpg) Date: 2016-01-24 20:37:43Cryptography Computer security Logger Data Logfile Public-key cryptography Log analysis Trusted computing Disk encryption Trusted Platform Module | | Continuous Tamper-proof Logging Using TPM 2.0 Arunesh Sinha1 , Limin Jia1 , Paul England2 , and Jacob R. Lorch2 1 Carnegie Mellon University, Pittsburgh, Pennsylvania, USAAdd to Reading ListSource URL: www.andrew.cmu.eduDownload Document from Source Website File Size: 349,50 KBShare Document on Facebook
|