Verifying a Privacy CA Remote Attestation Protocol.
Brigid HallingPerry AlexanderPublished in: NASA Formal Methods (2013)
Keyphrases
- wireless sensor networks
- security protocols
- remote attestation
- key management
- lightweight
- security mechanisms
- security issues
- trusted computing
- cloud computing
- personal information
- privacy preserving
- routing protocol
- virtual machine
- computing platform
- trust relationships
- trusted platform module
- security requirements
- multi party
- rfid tags
- access control
- low cost
- software engineering