Online Public Access Catalogue (OPAC)
Library,Documentation and Information Science Division

“A research journal serves that narrow

borderland which separates the known from the unknown”

-P.C.Mahalanobis


Normal view MARC view ISBD view

Trusted platform module basics [electronic resource] : using TPM in embedded systems / Steven L. Kinney.

By: Kinney, Steven.
Material type: TextTextSeries: Embedded technology series: Publisher: Oxford : Newnes, 2006Description: 1 online resource (xv, 352 p.).ISBN: 9780080465166 (electronic bk.); 0080465161 (electronic bk.).Subject(s): Embedded computer systems | Computer security | COMPUTERS -- Hardware -- Personal Computers -- Macintosh | COMPUTERS -- Hardware -- Personal Computers -- PCsGenre/Form: Electronic books.Additional physical formats: Print version:: Trusted platform module basics.DDC classification: 621.3916 Online resources: EBSCOhost
Contents:
Chapter 11: Initialization and Low-Level Command SuiteChapter 12: Compliance Vectors and Their Purpose; Chapter 13: Establishing a TPM Owner; Chapter 14: Owner-Authorized Command Suite; Chapter 15: The Key Management Command Suite; Chapter 16: The RSA Encryption and Decryption Command Suite; Chapter 17: The TPM Signature Command; Chapter 18: The RNG Command Suite; Chapter 19: The PCR Command Suite; Chapter 20: The TPM Capability and Self-Test Command Sui
Summary: Intended for embedded designers, this book provides a foundation on the TPM, helping designers take advantage of hardware security based on sound TCG standards. It covers the TPM basics, discussing the TPM Key Hierarchy and the Trusted Platform Module specification. It also includes an accompanying CD-ROM that contains source code.
Tags from this library: No tags from this library for this title. Log in to add tags.
No physical items for this record

Description based on print version record.

Chapter 11: Initialization and Low-Level Command SuiteChapter 12: Compliance Vectors and Their Purpose; Chapter 13: Establishing a TPM Owner; Chapter 14: Owner-Authorized Command Suite; Chapter 15: The Key Management Command Suite; Chapter 16: The RSA Encryption and Decryption Command Suite; Chapter 17: The TPM Signature Command; Chapter 18: The RNG Command Suite; Chapter 19: The PCR Command Suite; Chapter 20: The TPM Capability and Self-Test Command Sui

Intended for embedded designers, this book provides a foundation on the TPM, helping designers take advantage of hardware security based on sound TCG standards. It covers the TPM basics, discussing the TPM Key Hierarchy and the Trusted Platform Module specification. It also includes an accompanying CD-ROM that contains source code.

There are no comments for this item.

Log in to your account to post a comment.
Library, Documentation and Information Science Division, Indian Statistical Institute, 203 B T Road, Kolkata 700108, INDIA
Phone no. 91-33-2575 2100, Fax no. 91-33-2578 1412, ksatpathy@isical.ac.in


Visitor Counter