Security of Direct Anonymous Authentication Using TPM 2.0 Signature - A Possible Implementation Flaw.
Tao ZhangSherman S. M. ChowPublished in: Inscrypt (2014)
Keyphrases
- trusted platform module
- trusted computing
- computing platform
- computer security
- security analysis
- security issues
- identity authentication
- security requirements
- security mechanisms
- signature verification
- remote attestation
- authentication scheme
- data encryption
- private key
- digital signature scheme
- security services
- biometric data
- cloud computing
- security protocols
- computing environments