메뉴 건너뛰기




Volumn 30, Issue 11 A, 2009, Pages 29-36

Design and validation for a remote attestation security protocol

Author keywords

CSP; Remote attestation; Security protocol; Trusted computing

Indexed keywords

FORMAL ANALYSIS METHOD; INTEROPERATIONS; REMOTE ATTESTATION; SECURITY PROPERTIES; SECURITY PROTOCOLS; SECURITY REQUIREMENTS; TRUST COMPUTING; TRUSTED COMPUTING;

EID: 77954674606     PISSN: 1000436X     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (2)

References (11)
  • 3
    • 85084162270 scopus 로고    scopus 로고
    • Design and implementation of a TCG-based integrity measurement architecture
    • SAILER R, ZHANG X, JAEGE R. Design and implementation of a TCG-based integrity measurement architecture[A]. 13th USENIX Security Symposium[C]. 2004.
    • (2004) 13th USENIX Security Symposium
    • Sailer, R.1    Zhang, X.2    Jaege, R.3
  • 5
    • 77954681367 scopus 로고    scopus 로고
    • Security of authentication protocols involving trusted third party
    • ZHUO J L, LIN H L, LI X X. Security of authentication protocols involving trusted third party[J]. Application Research of Computers, 2004, 3: 109-112.
    • (2004) Application Research of Computers , vol.3 , pp. 109-112
    • Zhuo, J.L.1    Lin, H.L.2    Li, X.X.3
  • 6
    • 54749122519 scopus 로고    scopus 로고
    • Research on attestation method for trust computing environment
    • FENG D G, QIN Y. Research on attestation method for trust computing environment[J]. Chinese Journal of Computers, 2008, 9(31): 1640-1652.
    • (2008) Chinese Journal of Computers , vol.9 , Issue.31 , pp. 1640-1652
    • Feng, D.G.1    Qin, Y.2
  • 7
    • 77954677349 scopus 로고    scopus 로고
    • Design and implementation of TPM-based remote attestation
    • CHEN J, XIAO Z, HOU Z F. Design and implementation of TPM-based remote attestation[J]. Application Research of Computers, 2007, 6(24): 64-69.
    • (2007) Application Research of Computers , vol.6 , Issue.24 , pp. 64-69
    • Chen, J.1    Xiao, Z.2    Hou, Z.F.3
  • 8
    • 33846550570 scopus 로고    scopus 로고
    • Research on attestation scheme of trusted computation platform
    • LIU H W, ZHU G Z. Research on attestation scheme of trusted computation platform[J]. Computer Engineering, 2006, 32(24): 149-151.
    • (2006) Computer Engineering , vol.32 , Issue.24 , pp. 149-151
    • Liu, H.W.1    Zhu, G.Z.2
  • 9
    • 61949243760 scopus 로고    scopus 로고
    • Attestation proxy party-supported remote attestation model and its secure protocol
    • ZHANG Z Y, PEI Q Q, YANG L. Attestation proxy party-supported remote attestation model and its secure protocol[J]. Journal of Xidian University, 2009, 2(36): 58-63.
    • (2009) Journal of Xidian University , vol.2 , Issue.36 , pp. 58-63
    • Zhang, Z.Y.1    Pei, Q.Q.2    Yang, L.3
  • 10
    • 77954674642 scopus 로고    scopus 로고
    • Research on key technology of trusted authentication
    • Beijing Jiaotong University
    • ZHAO J. Research on Key Technology of Trusted Authentication[D]. Beijing Jiaotong University, 2008.
    • (2008)
    • Zhao, J.1
  • 11
    • 33644948261 scopus 로고    scopus 로고
    • The approaches and technologies for formal verification of security protocols
    • XUE R, FENG D G. The approaches and technologies for formal verification of security protocols[J]. Chinese Journal of Computers, 2006, 1(29): 1-20.
    • (2006) Chinese Journal of Computers , vol.1 , Issue.29 , pp. 1-20
    • Xue, R.1    Feng, D.G.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.