Introduction to the TPM

17Citations
Citations of this article
49Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The Trusted Platform Module (TPM) and smart card devices have many features in common. Both are low cost, tamper resistant, small footprint devices used to provide the basis of a secure computing environment. This chapter presents an introduction to the security mechanisms provided by the TPM highlighting those not typically found on a smart card. The concept of "ownership" is one of the major differences between the TPM and a smart card and this is described in some detail before concluding with a review of some of the security services uniquely provided by the TPM. © 2008 Springer-Verlag US.

Cite

CITATION STYLE

APA

Tomlinson, A. (2008). Introduction to the TPM. In Smart Cards, Tokens, Security and Applications (pp. 155–172). Springer US. https://doi.org/10.1007/978-0-387-72198-9_7

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free