Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Problem Statement

Devices that are concerned with illegitimate access or changes can protect secret material using the tpm. We consider two use cases.

...