ACISP '01 Proceedings of the 6th Australasian Conference on Information Security and Privacy
A secure and reliable bootstrap architecture
SP '97 Proceedings of the 1997 IEEE Symposium on Security and Privacy
Frontiers of Computer Science in China
Hi-index | 0.00 |
A boot system that uses a U-Key can help ensure the integrity of fairly static PC components.Moreover, the associated two-factor authentication makes a mobile computer's theft less likelybecause a thief can't use it.