Trusted Platform Module Basics: Using TPM in Embedded Systems (Embedded Technology)
Trusted Platform Module Basics: Using TPM in Embedded Systems (Embedded Technology)
Implementation Aspects of Mobile and Embedded Trusted Computing
Trust '09 Proceedings of the 2nd International Conference on Trusted Computing
BIOS security analysis and a kind of trusted BIOS
ICICS'07 Proceedings of the 9th international conference on Information and communications security
TGC'07 Proceedings of the 3rd conference on Trustworthy global computing
Hi-index | 0.00 |
Product piracy has become a serious threat for automation and mechanical engineering in recent years. Therefore effective protection measures are desperately needed. Especially the software has to be protected since it determines the machine's functionality and without software the machine (and the imitations) cannot work. Thereby it has to be prevented that software can be copied from one machine to another and that it can be manipulated in order to activate additional machine functionalities. Moreover the unauthorized replacement of software-equipped machine components must be prohibited. This can be achieved by applying Trusted Computing and TPMs to this new field of application.