UEFI Trusted Computing Vulnerability Analysis Based on State Transition Graph
Keyword(s):
1992 ◽
Vol 65
(3)
◽
pp. 189-224
◽
2002 ◽
Vol 20
(8)
◽
pp. 835-843
◽
Keyword(s):
2005 ◽
Vol 2005.7
(0)
◽
pp. 305-306
2011 ◽
Vol 2011
(0)
◽
pp. _1A1-L10_1-_1A1-L10_3
Keyword(s):
1991 ◽
Vol 36
(6)
◽
pp. 752-756
◽
Keyword(s):
2011 ◽
Vol 48-49
◽
pp. 71-78
◽