Login / Signup
A comprehensive formal security analysis and revision of the two-phase key exchange primitive of TPM 2.0.
Qianying Zhang
Shijun Zhao
Published in:
Comput. Networks (2020)
Keyphrases
</>
security analysis
key exchange
public key
smart card
security requirements
security properties
authentication protocol
encryption scheme
private key