A secure robust integrity reporting protocol of trusted computing for remote attestation under fully adaptive party corruptions

6Citations
Citations of this article
8Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Trusted computing has been proposed to enhance the security of computing environment in disparate computer platforms. Remote attestation is necessary to prove integrity and authenticity of system environments. Stumpf et al. propose a robust integrity reporting protocol for remote attestation. However, their protocol is not secure under fully adaptive party corruptions. In this paper, we propose a secure integrity reporting protocol for remote attestation under fully adaptive party corruptions. © 2012 Springer-Verlag GmbH.

Cite

CITATION STYLE

APA

Zhu, L., Zhang, Z., Liao, L., & Guo, C. (2012). A secure robust integrity reporting protocol of trusted computing for remote attestation under fully adaptive party corruptions. In Lecture Notes in Electrical Engineering (Vol. 143 LNEE, pp. 211–217). https://doi.org/10.1007/978-3-642-27323-0_27

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free