Research Article

Trusted Computing Strengthens Cloud Authentication

Figure 20

Checking identity based on TPM.
260187.fig.0020