搜索结果: 1-4 共查到“军事学 Trusted computing”相关记录4条 . 查询时间(0.062 秒)
Verification of FPGA-augmented trusted computing mechanisms based on Applied Pi Calculus
implementation Trusted Computing
font style='font-size:12px;'>
2018/1/2
Trusted computing technologies may play a key role for cloud security as they enable users to relax the trustworthiness assumptions about the provider that operates the physical cloud infrastructure. ...
A New Way to Prevent UKS Attacks Using Trusted Computing
UKS attacks Authenticated Key Exchange Trusted Computing
font style='font-size:12px;'>
2016/1/23
UKS (unknown key-share) attacks are common attacks on Authenticated Key Exchange (AKE) protocols. We summarize two popular countermeasures against UKS attacks on implicitly authenticated key exchang...
Improving Cut-and-Choose in Verifiable Encryption and Fair Exchange Protocols using Trusted Computing Technology
Cut-and-Choose Verifiable Encryption Fair Exchange Protocols Trusted Computing Technology
font style='font-size:12px;'>
2009/9/11
Cut-and-choose is used in interactive zero-knowledge protocols in which a prover answers a series
of random challenges that establish with high probability that the prover is honestly following the d...
An Anonymous Authentication Scheme for Trusted Computing Platform
Privacy Direct Anonymous Attestation Trusted Computing Platform
font style='font-size:12px;'>
2009/3/19
The Trusted Computing Platform is the industrial initiative
to implement computer security. However, privacy protection is a criti-
cal problem that must be solved in Trusted Computing Platform. In ...