Second Report on the Security of the TPM

Summary
Report outlining security proofs for the integrated TPM functionality.