Trusted computing
Espionage
Trusted Platform Module
Coprocessor
Tamper resistance
Kernel
Integrity
IBM
Secure cryptoprocessor
Computer security
Security
Cryptography