Secure Key Management of Mobile Agent System Using TPM-Based Technology on Trusted Computing Platform.
Xiaoping WuZhi-Dong ShenHuanguo ZhangPublished in: CSSE (3) (2008)
Keyphrases
- trusted platform module
- remote attestation
- security protocols
- key management
- trusted computing
- computing platform
- mobile agent system
- security mechanisms
- resource constrained
- ad hoc networks
- wireless sensor networks
- key distribution
- distributed computing
- key management scheme
- computing environments
- embedded systems
- cloud computing
- mobile agents
- computer security
- secret key
- authentication protocol
- fault tolerant
- key establishment
- computing systems
- virtual machine
- rfid tags
- parallel computing
- distributed environment
- fault tolerance
- development environment
- resource constraints
- peer to peer
- database systems