On the Feasibility of T-PKI as an Anonymization Protocol for TPMs in Trusted Computing Environments.
Art SedighiThomas DanielsDoug JacobsonPublished in: BigDataSecurity/HPSC/IDS (2022)
Keyphrases
- computing environments
- trusted computing
- group communication
- rfid systems
- privacy preserving
- lightweight
- fair exchange protocols
- mobile computing
- service discovery
- distributed computing environment
- information loss
- grid computing
- mobile agents
- authentication protocol
- multi party
- privacy protection
- privacy preservation
- security protocols
- public key
- mobile environments
- secure multi party
- security mechanisms
- distributed environment
- data dissemination
- public key infrastructure
- computing platform
- security analysis
- distributed databases
- fair exchange