Attestation proxy party-supported remote attestation model and its secure protocol

被引:0
|
作者
Key Lab. of Computer Network and Information Security, Xidian Univ., Xi'an 710071, China [1 ]
不详 [2 ]
不详 [3 ]
机构
来源
Xi'an Dianzi Keji Daxue Xuebao | 2009年 / 1卷 / 58-63+105期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [41] SCRAPS: Scalable Collective Remote Attestation for Pub-Sub IoT Networks with Untrusted Proxy Verifier
    Petzi, Lukas
    Ben Yahya, Ala Eddine
    Dmitrienko, Alexandra
    Tsudik, Gene
    Prantl, Thomas
    Kounev, Samuel
    PROCEEDINGS OF THE 31ST USENIX SECURITY SYMPOSIUM, 2022, : 3485 - 3501
  • [42] SHOTS: Scalable Secure Authentication-Attestation Protocol Using Optimal Trajectory in UAV Swarms
    Bansal, Gaurang
    Naren
    Chamola, Vinay
    Sikdar, Biplab
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2022, 71 (06) : 5827 - 5836
  • [43] RPRIA: Reputation and PUF-Based Remote Identity Attestation Protocol for Massive IoT Devices
    Cao, Jin
    Li, Sheng
    Ma, Ruhui
    Han, Yuxi
    Zhang, Yueyu
    Li, Hui
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (19) : 19174 - 19187
  • [44] Forming Virtualized Secure Framework for Location Based Services (LBS) using Direct Anonymous Attestation (DAA) protocol
    Othman, Hanunah
    Hashim, Habibah
    Razmi, Mohd Ameer Yuslan
    Ab Manan, Jamalul-lail
    2010 IEEE 6TH INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS (WIMOB), 2010, : 622 - 629
  • [45] Secure multi-party fuzzy comprehensive evaluation model and its protocol
    State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, China
    不详
    不详
    不详
    Beijing Youdian Daxue Xuebao, 2009, 3 (5-9):
  • [46] A Remote Attestation Security Model Based on Privacy-Preserving Blockchain for V2X
    Xu, Cheng
    Liu, Hongzhe
    Li, Peifeng
    Wang, Pengfei
    IEEE ACCESS, 2018, 6 : 67809 - 67818
  • [47] A secure anonymous but accountable proxy signature in standard model without trusted third party
    Du, H. (duhe@nuaa.edu.cn), 1600, Binary Information Press, P.O. Box 162, Bethel, CT 06801-0162, United States (09):
  • [48] A Tightly Secure Multi-party-signature Protocol in the Plain Model
    Wei, Lihao
    Ai, Jieqing
    Liu, Shenghan
    2015 8TH INTERNATIONAL CONFERENCE ON BIOMEDICAL ENGINEERING AND INFORMATICS (BMEI), 2015, : 672 - 677
  • [49] Secure two-party vector dominance statistic protocol and its applications
    Liu, Wen
    Luo, Shou-Shan
    Wang, Yong-Bin
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2010, 38 (11): : 2573 - 2577
  • [50] A Secure Sum Protocol and Its Application to Privacy-preserving Multi-party Analytics
    Mehnaz, Shagufta
    Bellala, Gowtham
    Bertino, Elisa
    PROCEEDINGS OF THE 22ND ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES (SACMAT'17), 2017, : 219 - 230