Automated Security Proof of Cryptographic Support Commands in TPM 2.0.
Weijin WangYu QinBo YangYingjun ZhangDengguo FengPublished in: ICICS (2016)
Keyphrases
- security protocols
- trusted computing
- key management
- encryption scheme
- cryptographic algorithms
- statistical databases
- service management
- security properties
- security policies
- security issues
- security requirements
- end users
- theorem proving
- theorem prover
- standard model
- security systems
- network security
- intrusion detection