메뉴 건너뛰기




Volumn 8, Issue 17, 2012, Pages 7103-7112

Remote attestation using chameleon hash and dynamic Huffman Merkle Hash tree

Author keywords

Chameleon hashing; Dynamic huffman merkle hash tree; Remote attestation; Trusted computing

Indexed keywords

CHAMELEON HASHING; EXECUTABLES; HASH VALUE; HUFFMAN MERKLE HASH TREES; REMOTE ATTESTATION; STORAGE SPACES; TRUSTED COMPUTING;

EID: 84866540011     PISSN: 15539105     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (4)

References (18)
  • 2
    • 85084162270 scopus 로고    scopus 로고
    • Design and implementation of a TCG-based integrity measurement architecture
    • Berkley: USENIX Association
    • R. Sailer, XL Zhang, T. Jaeger, L. van Doorn, Design and implementation of a TCG-based integrity measurement architecture [C] //Proceedings of the 13th USENIX Security Symp. Berkley: USENIX Association, 2004: 223-238.
    • (2004) Proceedings of the 13th USENIX Security Symp , pp. 223-238
    • Sailer, R.1    Zhang, X.L.2    Jaeger, T.3    van Doorn, L.4
  • 4
    • 79953070593 scopus 로고    scopus 로고
    • Fficient remote attestation mechanism with privacy protection
    • ZY Xu, YP He, LL Deng, fficient remote attestation mechanism with privacy protection [J], Journal of Software, 2011, 22 (2): 339-352.
    • (2011) Journal of Software , vol.22 , Issue.2 , pp. 339-352
    • Xu, Z.Y.1    He, Y.P.2    Deng, L.L.3
  • 6
    • 79957663072 scopus 로고    scopus 로고
    • Optimization of program behavior model for trusted computing dynamic attestation
    • Fajiang YU, Yuewei XU, Yue YU, Yang LIN, Yaohui WANG Optimization of Program Behavior Model for Trusted Computing Dynamic Attestation, Journal of Computational Information Systems, 2011, 7 (5): 1436-1445.
    • (2011) Journal of Computational Information Systems , vol.7 , Issue.5 , pp. 1436-1445
    • Yu, F.1    Xu, Y.2    Yu, Y.3    Lin, Y.4    Wang, Y.5
  • 7
    • 58349116044 scopus 로고    scopus 로고
    • Dynamic trustiness authentication framework based on software's behavior integrity
    • Los Alamitos, CA: IEEE Computer Society
    • Guojun Peng, Xuanchen Pan, Huanguo Zhang, Dynamic trustiness authentication framework based on software's behavior integrity [C] //Proc of the 9th Int Conf for Young Computer Scientists (ICYCS 2008), Los Alamitos, CA: IEEE Computer Society, 2008: 2283-2288.
    • (2008) Proc of the 9th Int Conf for Young Computer Scientists (ICYCS 2008) , pp. 2283-2288
    • Peng, G.1    Pan, X.2    Zhang, H.3
  • 9
    • 72849116409 scopus 로고    scopus 로고
    • Property based attestation and trusted computing: Analysis and challenges
    • Australia: IEEE Computer Society
    • Nagarajan, Aarthi, Property based attestation and trusted computing: Analysis and challenges [C] // Proc of the 3rd International Conference on Network and System Security, Australia: IEEE Computer Society, 2009: 278-285.
    • (2009) Proc of the 3rd International Conference on Network and System Security , pp. 278-285
    • Nagarajan1    Aarthi2
  • 10
    • 29244450159 scopus 로고    scopus 로고
    • Property-based attestation for computing platforms: Caring about properties, not Mechanisms
    • New York: ACM
    • AR. Sadeghi, C. Stuble, Property-based attestation for computing platforms: Caring about properties, not Mechanisms [C] //Proc of the 2004 Workshop on New Security Paradigms, New York: ACM, 2004: 67-77.
    • (2004) Proc of the 2004 Workshop on New Security Paradigms , pp. 67-77
    • Sadeghi, A.R.1    Stuble, C.2
  • 12
    • 77954683177 scopus 로고    scopus 로고
    • On privacy of property-based remote attestation
    • SJ LI, YP HE, DM LIU, CY YUAN, On privacy of property-based remote attestation [J], Journal on Communication, 2009, 30 (11A): 146-152.
    • (2009) Journal on Communication , vol.30 , Issue.11 A , pp. 146-152
    • Li, S.J.1    He, Y.P.2    Liu, D.M.3    Yuan, C.Y.4
  • 16
    • 26844519980 scopus 로고    scopus 로고
    • Efficient certificate revocation system implementation: Huffman merkle hash tree (HuffMHT)
    • JL. Munoz, J. Forne, O. Esparza, et al, Efficient certificate revocation system implementation: Huffman merkle hash tree (HuffMHT) [J], Springer-Verlag Berlin Heidelberg, LNCS, 2005: 119-127.
    • (2005) Springer-Verlag Berlin Heidelberg , pp. 119-127
    • Munoz, J.L.1    Forne, J.2    Esparza, O.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.