메뉴 건너뛰기




Volumn , Issue , 2011, Pages 66-80

Formal analysis of protocols based on TPM state registers

Author keywords

formal verification; TPM

Indexed keywords

CRYPTOGRAPHY; LOGIC PROGRAMMING; NETWORK SECURITY;

EID: 80052679988     PISSN: 19401434     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSF.2011.12     Document Type: Conference Paper
Times cited : (48)

References (21)
  • 3
    • 38049069294 scopus 로고    scopus 로고
    • Security evaluation of scenarios based on the TCG's TPM specification
    • Proc. 12th European Symposium On Research In Computer Security (ESORICS'07), ser. Springer
    • S. Gürgens, C. Rudolph, D. Scheuermann, M. Atts, and R. Plaga, "Security evaluation of scenarios based on the TCG's TPM specification," in Proc. 12th European Symposium On Research In Computer Security (ESORICS'07), ser. LNCS, vol. 4734. Springer, 2007, pp. 438-453.
    • (2007) LNCS , vol.4734 , pp. 438-453
    • Gürgens, S.1    Rudolph, C.2    Scheuermann, D.3    Atts, M.4    Plaga, R.5
  • 4
    • 85054438403 scopus 로고    scopus 로고
    • Offline dictionary attack on TCG TPM weak authorisation data, and solution
    • D. Grawrock, H. Reimer, A. Sadeghi, and C. Vishik, Eds. Vieweg & Teubner
    • L. Chen and M. D. Ryan, "Offline dictionary attack on TCG TPM weak authorisation data, and solution," in Future of Trust in Computing, D. Grawrock, H. Reimer, A. Sadeghi, and C. Vishik, Eds. Vieweg & Teubner, 2008.
    • (2008) Future of Trust in Computing
    • Chen, L.1    Ryan, M.D.2
  • 6
    • 33845936084 scopus 로고    scopus 로고
    • A logical account of NGSCB
    • 24th IFIP International Conference on Formal Techniques for Networked and Distributed Systems, ser. Springer
    • M. Abadi and T. Wobber, "A logical account of NGSCB,"in 24th IFIP International Conference on Formal Techniques for Networked and Distributed Systems, ser. Lecture Notes in Computer Science, vol. 3235. Springer, 2004, pp. 1-12.
    • (2004) Lecture Notes in Computer Science , vol.3235 , pp. 1-12
    • Abadi, M.1    Wobber, T.2
  • 13
    • 33747255010 scopus 로고    scopus 로고
    • Applying protocol analysis to security device interfaces
    • July-Aug
    • J. Herzog, "Applying protocol analysis to security device interfaces," IEEE Security & Privacy Magazine, vol. 4, no. 4, pp. 84-87, July-Aug 2006.
    • (2006) IEEE Security & Privacy Magazine , vol.4 , Issue.4 , pp. 84-87
    • Herzog, J.1
  • 17
    • 84957640213 scopus 로고    scopus 로고
    • Towards an automatic analysis of security protocols in first-order logic
    • Proc. 16th International Conference on Automated Deduction (CADE'99), ser. Springer
    • C. Weidenbach, "Towards an automatic analysis of security protocols in first-order logic," in Proc. 16th International Conference on Automated Deduction (CADE'99), ser. LNCS, vol. 1632. Springer, 1999, pp. 314-328.
    • (1999) LNCS , vol.1632 , pp. 314-328
    • Weidenbach, C.1
  • 18
    • 0034822279 scopus 로고    scopus 로고
    • An efficient cryptographic protocol verifier based on prolog rules
    • Cape Breton, Nova Scotia, Canada: IEEE Computer Society Press, Jun.
    • B. Blanchet, "An efficient cryptographic protocol verifier based on prolog rules," in Proc. of the 14th IEEE Computer Security Foundations Workshop (CSFW'01). Cape Breton, Nova Scotia, Canada: IEEE Computer Society Press, Jun. 2001, pp. 82-96.
    • (2001) Proc. of the 14th IEEE Computer Security Foundations Workshop (CSFW'01) , pp. 82-96
    • Blanchet, B.1
  • 19
    • 85170403372 scopus 로고    scopus 로고
    • "Bitlocker FAQ," http://technet.microsoft.com/en-us/library/ ee449438%28WS.10%29.aspx, 2011.
    • (2011) Bitlocker FAQ
  • 20
    • 77954749658 scopus 로고    scopus 로고
    • Escrowed data and the digital envelope
    • Trust and Trustworthy Computing (TRUST 2010), ser. Springer
    • K. Ables and M. Ryan, "Escrowed data and the digital envelope,"in Trust and Trustworthy Computing (TRUST 2010), ser. LNCS, vol. 6101. Springer, 2010, pp. 246-256.
    • (2010) LNCS , vol.6101 , pp. 246-256
    • Ables, K.1    Ryan, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.