Seth Schoen, Compatibility, competition, and control in trusted computing environments, Information Security Technical Report (2005) 10, 105-119
Schoen 2005
Published in:
Blog
Seth Schoen, Compatibility, competition, and control in trusted computing environments, Information Security Technical Report (2005) 10, 105-119