Building a Secure Scheme for a Trusted Hardware Sharing Environment.
Di LuJianfeng MaCong SunQixuan WuZhaochang SunNing XiPublished in: IEEE Access (2017)
Keyphrases
- trusted computing
- real time
- protection scheme
- authentication scheme
- computing platform
- low cost
- computing environments
- digital signature scheme
- dynamic environments
- information sharing
- computing systems
- public key encryption
- key agreement protocol
- secret sharing
- security analysis
- key management
- hardware implementation
- computer systems
- vlsi implementation
- provably secure
- hardware and software
- embedded systems
- key management scheme
- remote attestation
- mobile robot