A note on supplying a trusted clock via a secure device.
Mark LooiWilliam J. CaelliPublished in: Comput. Secur. (1994)
Keyphrases
- trusted computing
- secure multi party
- high speed
- remote attestation
- remote server
- data acquisition
- distributed environment
- security issues
- key management
- digital signature
- trusted platform module
- covert channel
- identity management
- authentication scheme
- security requirements
- multi party
- information sharing
- lightweight