메뉴 건너뛰기




Volumn , Issue , 2009, Pages 104-115

On-board credentials with open provisioning

Author keywords

Credentials; Provisioning protocols; Secure hardware; Trusted computing

Indexed keywords

ADDITIONAL COSTS; DEDICATED HARDWARE; DISTRIBUTED APPLICATIONS; NEW APPROACHES; PRIMARY CONTRIBUTION; PROPOSED ARCHITECTURES; PROVISIONING PROTOCOLS; SERVICE PROVIDER; TECHNICAL CHALLENGES; THIRD PARTIES; TRUSTED COMPUTING;

EID: 74049088382     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1533057.1533074     Document Type: Conference Paper
Times cited : (97)

References (21)
  • 1
  • 3
    • 77952341351 scopus 로고    scopus 로고
    • Dynamic symmetric key provisioning protocol (dskpp)
    • November
    • A. Doherty et al. Dynamic symmetric key provisioning protocol (dskpp). IETF Internet Draft, version 06, November 2008. http://tools.ietf.org/html/ draft-ietf-keyprov-dskpp-06.
    • (2008) IETF Internet Draft, Version 06
    • Doherty, A.1
  • 6
    • 45849091317 scopus 로고    scopus 로고
    • Onboard credentials platform: Design and implementation
    • Nokia Research Center, January
    • Jan-Erik Ekberg et al. Onboard credentials platform: Design and implementation. Technical Report NRC-TR-2008-001, Nokia Research Center, January 2008. http://research.nokia.com/files/NRCTR2008001pdf.
    • (2008) Technical Report NRC-TR-2008-001
    • Ekberg, J.1
  • 7
    • 51849128784 scopus 로고    scopus 로고
    • Mobile trusted module
    • Nokia Research Center, November
    • Jan-Erik Ekberg and Markku Kylänpää. Mobile trusted module. Technical Report NRC-TR-2007-015, Nokia Research Center, November 2007. http://research.nokia.com/files/NRCTR2007015pdf.
    • (2007) Technical Report NRC-TR-2007-015
    • Ekberg, J.1    Kylänpää, M.2
  • 9
    • 77952344732 scopus 로고    scopus 로고
    • August, GlobalPlatform white paper
    • GlobalPlatform. Why the mobile industry is evolving towards security, August 2007. GlobalPlatform white paper. http://www.globalplatform.org/uploads/ STIP-WhitePaperpdf.
    • (2007) Why the Mobile Industry Is Evolving Towards Security
  • 10
    • 85077701725 scopus 로고    scopus 로고
    • Lest we remember: Cold boot attacks on encryption keys
    • Alex Halderman et al. Lest we remember: Cold boot attacks on encryption keys. In Proc. Usenix Security Symposium, 2008. http://citp. princeton.edu/memory/.
    • (2008) Proc. Usenix Security Symposium
    • Halderman, A.1
  • 15
    • 77952381541 scopus 로고    scopus 로고
    • Cryptographic token key initialization protocol (CT-KIP)
    • November
    • Magnus Nyström. Cryptographic Token Key Initialization Protocol (CT-KIP). IETF RFC 4758, November 2006.
    • (2006) IETF RFC , pp. 4758
    • Nyström, M.1
  • 19
    • 77952383142 scopus 로고    scopus 로고
    • Tcg infrastructure workgroup
    • Specification Version 1.0 Revision, June
    • TCG Infrastructure Workgroup. Subject Key Attestation Evidence Extension", Specification Version 1.0 Revision 7, June 2005. https://www.trusted computinggroup.org/specs/IWG/.
    • (2005) Subject Key Attestation Evidence Extension" , pp. 7


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.