Trusted Computing Module – a simplistic explanation by Karen Lawrence Öqvist10 November 201111:061 Comment on Trusted Computing Module – a simplistic explanationInformation Security TPM A simplistic description of what TPM does from the Trusted Computing Group.
One Reply to “Trusted Computing Module – a simplistic explanation”