Boot with Integrity, or Don’t Boot
暂无分享,去创建一个
[1] Scott A. Rotondo. Trusted Computing Group , 2011, Encyclopedia of Cryptography and Security.
[2] N. Asokan,et al. Mobile Platform Security , 2013, Mobile Platform Security.
[3] Ariel J. Feldman,et al. Lest we remember: cold-boot attacks on encryption keys , 2008, CACM.