The mechanism about key and credential on trusted computing platform and the application study
From MaRDI portal
Publication:3443245
DOI10.1007/BF02831840zbMATH Open1115.68322OpenAlexW2063275421MaRDI QIDQ3443245FDOQ3443245
Authors: Zhidong Shen, Huanguo Zhang, Miao Zhang, Fei Yan, Li-qiang Zhang
Publication date: 1 June 2007
Published in: Wuhan University Journal of Natural Sciences (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/bf02831840
Recommendations
Data encryption (aspects in computer science) (68P25) Network design and communication in computer systems (68M10)
Cited In (13)
- A separated domain-based kernel model for trusted computing
- Implementing operating system support for extended trusted path in TPM-capable environments
- Protecting terminals by security domain mechanism based on trusted computing
- Trustworthiness technologies of DDSS
- Research on cryptology mechanism of trusted computing platform module
- An improved cryptology mechanism of trusted computing platform
- Design and formal analysis of TCM key migration protocols
- Single sign-on using trusted platforms
- Digital forensics of trusted computing environment
- Study and application of trusted computing technology
- Title not available (Why is that?)
- Development of trusted computing research
- Coded circuit for trusted computing: towards dynamic integrity measurement
This page was built for publication: The mechanism about key and credential on trusted computing platform and the application study
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3443245)