An Anonymous Authentication Scheme for Trusted Computing Platform.
He GePublished in: IACR Cryptol. ePrint Arch. (2005)
Keyphrases
- authentication scheme
- computing platform
- remote attestation
- trusted computing
- computing systems
- cloud computing
- smart card
- security protocols
- user authentication
- authentication protocol
- virtual machine
- secret key
- parallel computing
- distributed computing
- public key
- computing environments
- embedded systems
- development environment
- security analysis
- peer to peer
- key management
- user interface
- wireless sensor networks