메뉴 건너뛰기




Volumn 31, Issue 10, 2010, Pages 158-169

Access mechanism of TMP under mobile network

Author keywords

Mobile trusted module; Trusted computing; Trusted mobile platform; Universally composable security

Indexed keywords

ACCESS MECHANISM; EVALUATION SYSTEM; EXTENDED SERVICE SETS; MOBILE INTERNET; MOBILE NETWORKS; MOBILE PLATFORM; MOBILE TERMINAL; MOBILE TRUSTED MODULE; RESOURCE REQUEST; ROAMING SERVICES; SELF FIELD; TRUSTED COMPUTING; UNIVERSALLY COMPOSABLE SECURITY;

EID: 78649490338     PISSN: 1000436X     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (5)

References (15)
  • 1
    • 78649464677 scopus 로고    scopus 로고
    • Study on trusted mobile computing and its attestation scheme
    • Xing L, Zhu Y F, Wang M Q. Study on trusted mobile computing and its attestation scheme[J]. Computer Engineering and Design, 2008, 29(3): 1080-1082, 1085.
    • (2008) Computer Engineering and Design , vol.29 , Issue.3
    • Xing, L.1    Zhu, Y.F.2    Wang, M.Q.3
  • 2
    • 21644486314 scopus 로고    scopus 로고
    • TCG specification architecture overview (Version 1.2)
    • Trusted Computing Group.
    • Trusted Computing Group. TCG specification architecture overview (Version 1.2)[EB/OL]. https://www.Trustedcomputinggroup.org/. 2007.
    • (2007)
  • 3
    • 50549090759 scopus 로고    scopus 로고
    • TCG mobile trusted module specification version 1.0
    • Trusted Computing Group.
    • Trusted Computing Group. TCG mobile trusted module specification version 1.0 [EB/OL]. https://www.trustedcomputinggroup.org. 2007.
    • (2007)
  • 4
    • 51649129937 scopus 로고    scopus 로고
    • TCG mobile reference architecture version 1.0
    • Trusted Computing Group.
    • Trusted Computing Group. TCG mobile reference architecture version 1.0 [EB/OL]. https://www.trustedcomputinggroup.org. 2007.
    • (2007)
  • 5
    • 85040567886 scopus 로고    scopus 로고
    • Trusted mobile platform hardware architecture description
    • TMP.
    • TMP. Trusted mobile platform hardware architecture description[EB/OL]. http://www.trustedmobile.org/.
  • 6
    • 33749482809 scopus 로고    scopus 로고
    • Trusted computing based user authentication for mobile equipment
    • Zhen Y, He D K, He M X. Trusted computing based user authentication for mobile equipment[J]. Chinese Journal of Computers, 2006, 29(8): 1255-1264.
    • (2006) Chinese Journal of Computers , vol.29 , Issue.8 , pp. 1255-1264
    • Zhen, Y.1    He, D.K.2    He, M.X.3
  • 8
    • 78649458201 scopus 로고    scopus 로고
    • Access model spanning identifier domain based on trusted mobile platform
    • Li J, He Y Z, Shen C X, et al. Access model spanning identifier domain based on trusted mobile platform[J]. Application Research of Computers, 2009, 26(1): 321-324.
    • (2009) Application Research of Computers , vol.26 , Issue.1 , pp. 321-324
    • Li, J.1    He, Y.Z.2    Shen, C.X.3
  • 9
    • 78649455437 scopus 로고    scopus 로고
    • Identity management framework based on trusted mobile platform
    • Li J, He Y Z, Shen C X, et al. Identity management framework based on trusted mobile platform[J]. Application Research of Computers, 2009, 26(12): 3711-3714.
    • (2009) Application Research of Computers , vol.26 , Issue.12 , pp. 3711-3714
    • Li, J.1    He, Y.Z.2    Shen, C.X.3
  • 10
    • 78649480895 scopus 로고    scopus 로고
    • Research on routing theory and key technologies in mobile internet
    • Beijing: Beijing Jiaotong University
    • Su W. Research on Routing Theory and Key Technologies in Mobile Internet[D]. Beijing: Beijing Jiaotong University, 2008.
    • (2008)
    • Su, W.1
  • 11
    • 70349237263 scopus 로고    scopus 로고
    • Peer-to-peer key technologies in mobile internet
    • Li W, Xu Z Q, Yang Z. Peer-to-peer key technologies in mobile internet[J]. Journal of Software, 2009,20(8): 2199-2213.
    • (2009) Journal of Software , vol.20 , Issue.8 , pp. 2199-2213
    • Li, W.1    Xu, Z.Q.2    Yang, Z.3
  • 12
    • 78149372097 scopus 로고    scopus 로고
    • An improved directed anonymous attestation scheme
    • Li J, Wu Z Q, Yu L, et al. An improved directed anonymous attestation scheme[J]. Journal of Computer Applications, 2009, 29 (2): 364-366, 397.
    • (2009) Journal of Computer Applications , vol.29 , Issue.2
    • Li, J.1    Wu, Z.Q.2    Yu, L.3
  • 13
    • 36249019387 scopus 로고    scopus 로고
    • Universally composable secure authentication protocol for wireless mesh networks
    • Yang C, Cao C J, Ma J F. Universally composable secure authentication protocol for wireless mesh networks[J]. Journal of Xidian University, 2007, 34(5): 814-817.
    • (2007) Journal of Xidian University , vol.34 , Issue.5 , pp. 814-817
    • Yang, C.1    Cao, C.J.2    Ma, J.F.3
  • 14
    • 0023985465 scopus 로고    scopus 로고
    • A digital signature scheme secure against adaptive chosen-message attacks
    • Goldwasser S, Micali S, Rivest R. A digital signature scheme secure against adaptive chosen-message attacks[J]. SIAM Journal on Computing, 1998, 17(2): 281-308.
    • (1998) SIAM Journal on Computing , vol.17 , Issue.2 , pp. 281-308
    • Goldwasser, S.1    Micali, S.2    Rivest, R.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.