Mitigating Software Integrity Attacks With Trusted Computing in a Time Distribution Network | Publicación