A Secure and Practical Approach for Providing Anonymity Protection for Trusted Platforms.
Kurt DietrichJohannes WinterPublished in: ICICS (2010)
Keyphrases
- data protection
- privacy protection
- trusted computing
- security architecture
- security level
- real world
- individual privacy
- security issues
- information security
- access control
- key management
- protection scheme
- data security
- security properties
- data confidentiality
- previously mentioned
- secure multi party
- trusted third party
- computing platform
- ad hoc networks
- mobile devices