Trusted Computing Based Mobile DRM Authentication Scheme.
Zhen YangKefeng FanYingxu LaiPublished in: IAS (2009)
Keyphrases
- trusted computing
- authentication scheme
- computing environments
- smart card
- secret key
- user authentication
- computing platform
- remote attestation
- cloud computing
- computer security
- trusted platform module
- virtual organization
- public key
- security analysis
- authentication protocol
- information systems
- access control policies
- databases