欢迎您!
东篱公司
退出
申报数据库
申报指南
立项数据库
成果数据库
期刊论文
会议论文
著 作
专 利
项目获奖数据库
位置:
成果数据库
>
会议
> 会议详情页
Automated Proof for Authorization Protocols of TPM 2.0 in computational model
所属机构名称:中国科学院软件研究所
会议名称:ISPEC 2014
时间:2014.5.5
成果类型:会议
相关项目:可信计算环境测评理论和技术研究
同会议论文项目
可信计算环境测评理论和技术研究
期刊论文 56
会议论文 49
著作 1
同项目会议论文
Improving the security of the HMQV protocol using tamper-proof hardware
Universally Composable secure TNC
Authenticated key exchange from ideal lattices
3kf9: enhancing 3GPP-MAC beyond the birthday bound
Ciphertext Policy Attribute-Based Encryption from Lattices
Formal Analysis of Enhanced Authorization in the TPM 2.0
TSD: A Flexible Root of Trust for the Cloud
Autocorrelation Values of New Generalized Cyclotomic Sequences of Order six over $Z_{pq}$
Secure and Efficient Data-Sharing in Clouds
Towards a Secure Certificateless Proxy Re-encryption Scheme,Towards a Secure Certificateless Proxy R
Fully Secure Doubly-Spatial Encryption under Simple Assumptions
Combined Public-Key Schemes: The Case of ABE and ABS
Real Time Cryptanalysis of Bluetooth Encryption with Condition Masking
Type-Based Analysis of Protected Storage in the TPM
TEEM: A User-Oriented Trusted Mobile Device for Multi-platform Security Applications
Mobile Trusted Agent(MTA):Build user-based trust for general-purpose computer platform
On the Security of an Efficient Attribute-Based Signature
KP-ABE Based Verifiable Cloud Access Control Scheme
Proxy re-encryption with unforgeable re-encryption keys
Authenticated Key Exchange with Entities from Different Settings and Varied Groups
DAA-TZ: An Efficient DAA Scheme for Mobile Devices using ARM TrustZone
Efficient Attribute Proofs in Anonymous Credential Using Attribute-based Cryptography
Integral Based Fault Analysis on LBlock
A Unified Security Analysis of Two-phase Key Exchange Protocols in TPM 2.0
Padding Oracle Attack on PKCS#1 v1.5: Can non-standard implementation act as a shelter
A general method to evaluate the correlation of randomness tests
A New Efficient Property-based Attestation Protocol Based on Elliptic Curves
TSD: A Flexible Root of Trust for the Cloud
Combined public-key schemes: The case of ABE and ABS
Fully secure doubly-spatial encryption under simple assumptions
An Attribute Based Encryption Scheme with Fine-Grained Attribute Revocation
TrustToken: a Generic Security Framework for Mobile Two-factor Authentication Using TrustZone
Security Analysis of EMV Channel Establishment Protocol in an Enhanced Security Model
Black-box Separation for One-more (Static) CDH and Its Generation
ExBLACR: Extending BLACR System
DAA-Related APIs in TPM 2.0 Revisited
Direct Anonymous Attestation in practice: Implementation and efficient revocation
Formal Analysis of DAA-Related APIs in TPM 2.0
Mdaak: A flexible and efficient framework for direct anonymous attestation on mobile devices
Providing Root of Trust for ARM TrustZone using On-Chip SRAM
A Lightweight Anonymous M-shopping Scheme Based on DAA for Trusted Mobile Platform
ARBRA: Anonymous Reputation-Based Revocation with Efficient Authentication
FARB: Fast Anonymous Reputation-Based Blacklisting without TTPs
Ciphertext Policy Attribute-Based Encryption from Lattices
. A New Efficient Property-based Attestation Protocol Based on Elliptic Curves
Formal analysis of ECC-based Direct Anonymous Attestation schemes in Applied Pi Calculus
Fully Secure Attribute-Based Systems with Short Ciphertexts/Signatures and Threshold Access Structur
Certificateless Proxy Re-Encryption without Pairings