Return to Article Details Leveraging Trusted Platform Modules for Hardware Rooted Security and Robust Device Encryption Download Download PDF