메뉴 건너뛰기




Volumn 6101 LNCS, Issue , 2010, Pages 30-46

Key attestation from trusted execution environments

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHIC KEY; EXECUTION ENVIRONMENTS; EXTERNAL KEY; TREE-BASED;

EID: 77954717010     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-13869-0_3     Document Type: Conference Paper
Times cited : (7)

References (17)
  • 1
    • 77954691669 scopus 로고    scopus 로고
    • ARM. Trustzone technology overview (2009), http://www.arm.com/products/ security/trustzone/index.html
    • (2009) Trustzone Technology Overview
  • 2
    • 70350637699 scopus 로고    scopus 로고
    • Measuring semantic integrity for remote attestation
    • Chen, L., Mitchell, C.J., Martin, A. (eds.) Trust 2009. Springer, Heidelberg
    • Baiardi, F., Cilea, D., Sgandurra, D., Ceccarelli, F.: Measuring semantic integrity for remote attestation. In: Chen, L., Mitchell, C.J., Martin, A. (eds.) Trust 2009. LNCS, vol. 5471, pp. 81-100. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5471 , pp. 81-100
    • Baiardi, F.1    Cilea, D.2    Sgandurra, D.3    Ceccarelli, F.4
  • 3
    • 52949106502 scopus 로고    scopus 로고
    • The trusted execution module: Commodity general-purpose trusted computing
    • Grimaud, G., Standaert, F.-X. (eds.) CARDIS 2008. Springer, Heidelberg
    • Costan, V., Sarmenta, L.F.G., van Dijk, M., Devadas, S.: The trusted execution module: Commodity general-purpose trusted computing. In: Grimaud, G., Standaert, F.-X. (eds.) CARDIS 2008. LNCS, vol. 5189, pp. 133-148. Springer, Heidelberg (2008), http://people.csail.mit.edu/devadas/pubs/cardis08tem.pdf
    • (2008) LNCS , vol.5189 , pp. 133-148
    • Costan, V.1    Sarmenta, L.F.G.2    Van Dijk, M.3    Devadas, S.4
  • 4
    • 70449690094 scopus 로고    scopus 로고
    • Internet Crime Complaint Center. Internet crime report (2008), http://www.ic3.gov/media/annualreport/2008-IC3Report.pdf
    • (2008) Internet Crime Report
  • 5
    • 84958776015 scopus 로고    scopus 로고
    • Personal secure booting
    • Varadharajan, V., Mu, Y. (eds.) ACISP 2001. Springer, Heidelberg
    • Itoi, N., Arbaugh, W.A., Pollack, S.J., Reeves, D.M.: Personal secure booting. In: Varadharajan, V., Mu, Y. (eds.) ACISP 2001. LNCS, vol. 2119, pp. 130-144. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2119 , pp. 130-144
    • Itoi, N.1    Arbaugh, W.A.2    Pollack, S.J.3    Reeves, D.M.4
  • 10
    • 77954743351 scopus 로고    scopus 로고
    • Nokia. Symbian OS platform security, http://www.forum.nokia.com/ Technology-Topics/Device-Platforms/S60/Platform-Security/
    • Symbian OS Platform Security
  • 12
    • 77954728369 scopus 로고    scopus 로고
    • November
    • SANS Institute. SANS Top-20 2007 Security Risks (November 2008), http://www.sans.org/top20/2007/top20.pdf
    • (2008) SANS Top-20 2007 Security Risks
  • 13
    • 33646075344 scopus 로고    scopus 로고
    • Outbound authentication for programmable secure coprocessors
    • Smith, S.W.: Outbound authentication for programmable secure coprocessors. International Journal of Information Security 3, 28-41 (2004)
    • (2004) International Journal of Information Security , vol.3 , pp. 28-41
    • Smith, S.W.1
  • 14
    • 77954722817 scopus 로고    scopus 로고
    • M-Shield mobile security technology
    • Srage, J., Azema, J.: M-Shield mobile security technology, TI White paper (2005), http://focus.ti.com/pdfs/wtbu/ti-mshield-whitepaper.pdf
    • (2005) TI White Paper
    • Srage, J.1    Azema, J.2
  • 15
    • 77954739187 scopus 로고    scopus 로고
    • Trusted Computing Group, https://www.trustedcomputinggroup.org/home


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.