Vulnerability Analysis for the Authentication Protocols in Trusted Computing Platforms and a Proposed Enhancement of the OffPAD Protocol.
Mada AlhaidarySk. Md. Mizanur RahmanMohammed ZakariahM. Shamim HossainAtif AlamriMd Sarwar M. HaqueBrij B. GuptaPublished in: IEEE Access (2018)
Keyphrases
- authentication protocol
- remote attestation
- security protocols
- computing platform
- cryptographic protocols
- trusted computing
- ban logic
- key management
- rfid systems
- security mechanisms
- session key
- lightweight
- rfid tags
- virtual machine
- smart card
- parallel computing
- security analysis
- embedded systems
- information systems
- computing systems
- distributed computing
- computing environments
- cloud computing