Autonomous Secure Remote Attestation even when all Used and to be Used Digital Keys Leak.
Marten van DijkDeniz GurevinChenglu JinOmer KhanPhuong Ha NguyenPublished in: IACR Cryptol. ePrint Arch. (2021)
Keyphrases
- remote attestation
- trusted computing
- computing platform
- cloud computing
- virtual machine
- security protocols
- embedded systems
- trusted platform module
- computing environments
- security mechanisms
- grid systems
- distributed computing
- information flow
- parallel computing
- operating system
- computer security
- data management
- identity management
- computing systems
- database systems
- data center
- user interface