Trusted Computing in 2025?

  • risk analysis
  • modeling
  • security tools
  • Hardware
  • Software
  • The University of Texas at Austin
  • 2014
  • Cyber2025
  • Presentation
  • Academia
  • Session 4
  • Session 4
Submitted by Warren Hunt on