Login / Signup
Automatic Analysis of Security Properties of the TPM.
Mark Dermot Ryan
Published in:
INTRUST (2012)
Keyphrases
</>
automatic analysis
security properties
security analysis
security requirements
formal model
security protocols
security vulnerabilities
public key
software architecture
cryptographic protocols
trusted computing
formal methods
key agreement
artificial intelligence
authentication protocol
body movements