搜索结果: 1-4 共查到“军事学 Trusted Computing”相关记录4条 . 查询时间(0.059 秒)
Verification of FPGA-augmented trusted computing mechanisms based on Applied Pi Calculus
implementation Trusted Computing
2018/1/2
Trusted computing technologies may play a key role for cloud security as they enable users to relax the trustworthiness assumptions about the provider that operates the physical cloud infrastructure. ...
A New Way to Prevent UKS Attacks Using Trusted Computing
UKS attacks Authenticated Key Exchange Trusted Computing
2016/1/23
UKS (unknown key-share) attacks are common attacks on Authenticated Key Exchange (AKE) protocols. We summarize two popular countermeasures against UKS attacks on implicitly authenticated key exchang...
Improving Cut-and-Choose in Verifiable Encryption and Fair Exchange Protocols using Trusted Computing Technology
Cut-and-Choose Verifiable Encryption Fair Exchange Protocols Trusted Computing Technology
2009/9/11
Cut-and-choose is used in interactive zero-knowledge protocols in which a prover answers a series
of random challenges that establish with high probability that the prover is honestly following the d...
An Anonymous Authentication Scheme for Trusted Computing Platform
Privacy Direct Anonymous Attestation Trusted Computing Platform
2009/3/19
The Trusted Computing Platform is the industrial initiative
to implement computer security. However, privacy protection is a criti-
cal problem that must be solved in Trusted Computing Platform. In ...