Login / Signup

Revocation of TPM Keys.

Stefan KatzenbeisserKlaus KursaweFrederic Stumpf
Published in: TRUST (2009)
Keyphrases
  • access control
  • trusted computing
  • secret key
  • computing platform
  • blind signature
  • databases
  • data mining
  • information retrieval
  • public key
  • key management
  • private key