Protecting the Creation of Digital Signatures with Trusted Computing Platform Technology Against Attacks by Trojan Horse Programs.
Adrian SpalkaArmin B. CremersHanno LangwegPublished in: SEC (2001)
Keyphrases
- remote attestation
- computing platform
- security mechanisms
- digital signature
- trusted computing
- security protocols
- access control
- computer security
- public key
- digital watermarking
- smart card
- computing systems
- virtual machine
- data processing
- resource constrained
- cost effective
- parallel computing
- security issues
- security requirements
- case study
- watermarking technique
- cloud computing
- distributed computing
- development environment
- databases
- key management
- embedded systems
- mobile agents
- computer systems
- digital libraries