Physically restricted authentication with trusted hardware.
Michael S. KirkpatrickElisa BertinoPublished in: STC (2009)
Keyphrases
- trusted platform module
- trusted computing
- low cost
- computing power
- real time
- hardware implementation
- hardware and software
- remote attestation
- trust relationships
- embedded systems
- computer systems
- hardware architecture
- network access
- vlsi implementation
- network connection
- parallel hardware
- image processing
- factor authentication
- fragile watermarking
- authentication scheme
- authentication protocol
- computing systems
- biometric authentication
- security mechanisms
- authentication mechanism
- data acquisition
- wireless networks
- neural network