TPMv2 Analysis

posted in #IT Security on the 4.03.2015

The “Trusted Computing” technology offers interesting  concepts and methods to increase the trustworthiness of connected systems. By adding a new component […]