On the provable security of TPM2.0 cryptography APIs.
XiaoBo ChuDengguo FengPublished in: Int. J. Embed. Syst. (2015)
Keyphrases
- information security
- trusted computing
- encryption algorithms
- security issues
- trusted platform module
- cryptographic algorithms
- access control
- network security
- security requirements
- elliptic curve cryptography
- cellular automata
- computer security
- security policies
- lightweight
- security analysis
- intrusion detection
- security mechanisms
- public key cryptography
- open source
- security level
- encryption algorithm
- data encryption
- security systems
- security model
- computing platform
- application developers