메뉴 건너뛰기




Volumn 4462 LNCS, Issue , 2007, Pages 53-66

Securing the distribution and storage of secrets with trusted platform modules

Author keywords

[No Author keywords available]

Indexed keywords

DATA TRANSFER; NETWORK PROTOCOLS; USER INTERFACES; COMPUTATION THEORY; HARDWARE SECURITY; INTELLIGENT BUILDINGS; SECURITY OF DATA; SMART CARDS; UBIQUITOUS COMPUTING;

EID: 37149049972     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-72354-7_5     Document Type: Conference Paper
Times cited : (18)

References (25)
  • 1
    • 0346236349 scopus 로고    scopus 로고
    • Art and Science. Addison Wesley Professional
    • Bishop, M.: Computer Security: Art and Science. Addison Wesley Professional (2003)
    • (2003) Computer Security
    • Bishop, M.1
  • 2
    • 37149052041 scopus 로고    scopus 로고
    • Trusted Computing Group: TCG architecture overview, TCG Specification
    • Trusted Computing Group: TCG architecture overview. (TCG Specification)
  • 3
    • 77954408441 scopus 로고    scopus 로고
    • Trusted Computing Group: version 1.2, TCG Specification
    • Trusted Computing Group: TCG TPM specification version 1.2. (TCG Specification)
    • TCG TPM specification
  • 4
    • 33845228975 scopus 로고    scopus 로고
    • Cryptographic processors - a survey
    • Technical Report 641, University of Cambridge
    • Anderson, R., Bond, M., Clulow, J., Skorobogatov, S.: Cryptographic processors - a survey. Technical Report 641, University of Cambridge (2005)
    • (2005)
    • Anderson, R.1    Bond, M.2    Clulow, J.3    Skorobogatov, S.4
  • 7
    • 37149048897 scopus 로고    scopus 로고
    • Microsoft: Windows Vista beta 2 trusted platform module services step by step guide. (Published on the WWW)
    • Microsoft: Windows Vista beta 2 trusted platform module services step by step guide. (Published on the WWW)
  • 11
    • 35348989745 scopus 로고    scopus 로고
    • Trusted Computing
    • Mitchell, C, ed, of, The Institution of Electrical Engineers
    • Mitchell, C., ed.: Trusted Computing. Volume 6 of IEE Professional Applications of Computing. The Institution of Electrical Engineers (2005)
    • (2005) IEE Professional Applications of Computing , vol.6
  • 13
    • 35048847167 scopus 로고    scopus 로고
    • Better privacy for trusted computing platforms
    • Samarati, P, Ryan, P, Gollmann, D, Molva, R, eds, Proceedings of the 9th European Symposium on Research in Computer Security ESORICS, of, Springer-Verlag
    • Camenisch, J.: Better privacy for trusted computing platforms. In Samarati, P., Ryan, P., Gollmann, D., Molva, R., eds.: Proceedings of the 9th European Symposium on Research in Computer Security (ESORICS 2004). Volume 3193 of Lecture Notes in Computer Science., Springer-Verlag (2004) 73-88
    • (2004) Lecture Notes in Computer Science , vol.3193 , pp. 73-88
    • Camenisch, J.1
  • 14
    • 21644470487 scopus 로고    scopus 로고
    • Experimenting with TCPA/TCG hardware, or: How I learned to stop worrying and love the bear
    • Technical Report Dartmouth TR2003-476, Dartmouth College
    • Marchesini, J., Smith, S.W., Wild, O., MacDonald, R.: Experimenting with TCPA/TCG hardware, or: How I learned to stop worrying and love the bear. Technical Report Dartmouth TR2003-476, Dartmouth College (2003)
    • (2003)
    • Marchesini, J.1    Smith, S.W.2    Wild, O.3    MacDonald, R.4
  • 19
    • 30144435965 scopus 로고    scopus 로고
    • Enhancing data authenticity and integrity in p2p systems
    • Zhang, X., Chen, S., Sandhu, R.: Enhancing data authenticity and integrity in p2p systems. IEEE Internet Computing 9(6) (2005) 42 -49
    • (2005) IEEE Internet Computing , vol.9 , Issue.6 , pp. 42-49
    • Zhang, X.1    Chen, S.2    Sandhu, R.3
  • 21
    • 23144446730 scopus 로고    scopus 로고
    • Deconstructing Alice and Bob
    • Proceedings of the Workshop on Automated Reasoning for Security Protocol Analysis ARSPA, of
    • Caleiro, C., Viganò, L., Basin, D.: Deconstructing Alice and Bob. In: Proceedings of the Workshop on Automated Reasoning for Security Protocol Analysis (ARSPA 2005). Volume 135 of Electronic Notes in Theoretical Computer Science. (2005) 3-22
    • (2005) Electronic Notes in Theoretical Computer Science , vol.135 , pp. 3-22
    • Caleiro, C.1    Viganò, L.2    Basin, D.3
  • 22
    • 37149032670 scopus 로고    scopus 로고
    • Master's thesis, Massachusetts Institute of Technology
    • Lin, A.H.: Automated analysis of security APIs. Master's thesis, Massachusetts Institute of Technology (2005)
    • (2005) Automated analysis of security APIs
    • Lin, A.H.1
  • 23
    • 33746653767 scopus 로고    scopus 로고
    • Controlling access to documents: A formal access control model
    • Müller, G, ed, Proceedings of the 1st International Conference on Emerging Trends in Information and Communication Security ETRICS, of, Springer-Verlag
    • Sevinç, P.E., Basin, D., Olderog, E.R.: Controlling access to documents: A formal access control model. In Müller, G., ed.: Proceedings of the 1st International Conference on Emerging Trends in Information and Communication Security (ETRICS 2006). Volume 3995 of Lecture Notes in Computer Science., Springer-Verlag (2006) 352-367
    • (2006) Lecture Notes in Computer Science , vol.3995 , pp. 352-367
    • Sevinç, P.E.1    Basin, D.2    Olderog, E.R.3
  • 24
    • 33746653154 scopus 로고    scopus 로고
    • Controlling access to documents: A formal access control model
    • Technical Report 517, ETH Zurich
    • Sevinç, P.E., Basin, D.: Controlling access to documents: A formal access control model. Technical Report 517, ETH Zurich (2006)
    • (2006)
    • Sevinç, P.E.1    Basin, D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.