메뉴 건너뛰기




Volumn , Issue , 2004, Pages 25-31

User authentication with smart cards in trusted computing architecture

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER ARCHITECTURE; COMPUTER HARDWARE; COMPUTER SOFTWARE; DATABASE SYSTEMS; MATHEMATICAL MODELS; NETWORK PROTOCOLS; PERSONAL DIGITAL ASSISTANTS; USER INTERFACES;

EID: 12244276366     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (14)

References (9)
  • 1
    • 12244250631 scopus 로고    scopus 로고
    • October
    • David Safford, "The Need for TCPA?", http://www.research.ibm. com/gsal/tcpa/why_tcpa.pdf, October 2002
    • (2002) The Need for TCPA?
    • Safford, D.1
  • 2
    • 12244311064 scopus 로고    scopus 로고
    • Trusted Computing Group (TCG), http://www.trustedcomputinggroup.org/home/ , 2003
    • (2003)
  • 3
    • 12244261468 scopus 로고    scopus 로고
    • Microsoft, http://www.microsoft.com/ngscb/, 2003
    • (2003)
  • 4
    • 12244298765 scopus 로고    scopus 로고
    • What's in a trusted computing platform?
    • August
    • Graham Proudler, "What's in a Trusted Computing Platform?" InformIT, August 2002.
    • (2002) InformIT
    • Proudler, G.1
  • 6
    • 85008038596 scopus 로고    scopus 로고
    • Improving the TCPA specification
    • IEEE Computer Society, August
    • Bill Arbaugh, "Improving the TCPA specification",IEEE Computer, pages 77-79, Vol. 35 No8, IEEE Computer Society, August 2002
    • (2002) IEEE Computer , vol.35 , Issue.8 , pp. 77-79
    • Arbaugh, B.1
  • 9
    • 84956866637 scopus 로고    scopus 로고
    • Playing 'hide and seek' with stored keys
    • Springer-Verlag
    • Adi Shamir, Nicko van Someren, "Playing 'Hide and Seek' with Stored Keys", Financial Cryptography 1999, pages 118-124, Springer-Verlag, 1999
    • (1999) Financial Cryptography 1999 , pp. 118-124
    • Shamir, A.1    Van Someren, N.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.