Login / Signup
Circumventing Cryptographic Deniability with Remote Attestation.
Lachlan J. Gunn
Ricardo Vieitez Parra
N. Asokan
Published in:
Proc. Priv. Enhancing Technol. (2019)
Keyphrases
</>
remote attestation
security protocols
virtual machine
computing platform
trusted platform module
embedded systems
key management
trusted computing
cloud computing
security mechanisms
smart card
databases
rfid tags
security requirements