Design and validation for a remote attestation security protocol
By analyzing current remote attestation model, an improved remote attestation model was provided and de-signed.In order to verify whether it conforms to security requirement, a formal analysis method CSP was used to analyze the protocol and model it with CSP method.Meanwhile, it was checked with FDR...
Saved in:
| Main Authors: | WANG Dan, WEI Jin-feng, ZHOU Xiao-dong |
|---|---|
| Format: | Article |
| Language: | zho |
| Published: |
Editorial Department of Journal on Communications
2009-01-01
|
| Series: | Tongxin xuebao |
| Subjects: | |
| Online Access: | http://www.joconline.com.cn/thesisDetails?columnId=74649196&Fpath=home&index=0 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Method of designing security protocol for remote attestation
by: YU Rong-wei1, et al.
Published: (2008-01-01) -
Method of designing security protocol for remote attestation
by: YU Rong-wei1, et al.
Published: (2008-01-01) -
On privacy of property-based remote attestation
by: LI Shang-jie1, et al.
Published: (2009-01-01) -
On privacy of property-based remote attestation
by: LI Shang-jie1, et al.
Published: (2009-01-01) -
Research of platform identity attestation based on trusted chip
by: Qian-ying ZHANG, et al.
Published: (2014-08-01)