Trusted computing has been proposed to enhance the security of computing environment in disparate computer platforms. Remote attestation is necessary to prove integrity and authenticity of system environments. Stumpf et al. propose a robust integrity reporting protocol for remote attestation. However, their protocol is not secure under fully adaptive party corruptions. In this paper, we propose a secure integrity reporting protocol for remote attestation under fully adaptive party corruptions. © 2012 Springer-Verlag GmbH.
CITATION STYLE
Zhu, L., Zhang, Z., Liao, L., & Guo, C. (2012). A secure robust integrity reporting protocol of trusted computing for remote attestation under fully adaptive party corruptions. In Lecture Notes in Electrical Engineering (Vol. 143 LNEE, pp. 211–217). https://doi.org/10.1007/978-3-642-27323-0_27
Mendeley helps you to discover research relevant for your work.