版权说明 操作指南
首页 > 成果 > 详情

Improvement Of The DAA Protocol Based On TPM

认领
导出
Link by 万方会议论文
反馈
分享
QQ微信 微博
成果类型:
期刊论文、会议论文
作者:
Zhu Bian*;Chen Li;Cui Huan-huan;Tang Chao
通讯作者:
Zhu Bian
作者机构:
[Chen Li; Zhu Bian; Tang Chao; Cui Huan-huan] HuaZhong Nonnal Univ, Dept Comp Sci, Wuhan, Peoples R China.
通讯机构:
[Zhu Bian] H
HuaZhong Nonnal Univ, Dept Comp Sci, Wuhan, Peoples R China.
语种:
英文
关键词:
trusted computing;TPM;TTP;DAA;anonymous authentication
期刊:
PROCEEDINGS OF 2010 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (ICCSIT 2010), VOL 7
ISSN:
2381-3458
年:
2010
页码:
401-404
会议名称:
2010 3rd IEEE International Conference on Computer Science and Information Technology(第三届IEEE计算机科学与信息技术国际会议 ICCSIT 2010)
会议论文集名称:
2010 3rd IEEE International Conference on Computer Science and Information Technology(第三届IEEE计算机科学与信息技术国际会议 ICCSIT 2010)论文集
会议时间:
2010-07-07
会议地点:
成都
会议主办单位:
[Zhu Bian;Chen Li;Cui Huan-huan;Tang Chao] HuaZhong Nonnal Univ, Dept Comp Sci, Wuhan, Peoples R China.
会议赞助商:
中国电子学会<&wdkj&>国际计算机科学与信息技术协会<&wdkj&>IEEE
主编:
Hang, Y Desheng, W Sandhu, PS
出版地:
345 E 47TH ST, NEW YORK, NY 10017 USA
出版者:
IEEE
ISBN:
978-1-4244-5537-9
机构署名:
本校为第一且通讯机构
院系归属:
计算机学院
摘要:
Anonymous authentication is an important feature for trusted computing. Firstly, this paper describes two kinds of authentication model Trusted Computing Group (TCG) proposed -TTP model and DAA model, and then analyses their advantages and disadvantages. Secondly, the paper proposes an improved solution based on the elliptic curve algorithm (ECC) in the base of the original DAA model. Finally, the paper detailed ...

反馈

验证码:
看不清楚,换一个
确定
取消

成果认领

标题:
用户 作者 通讯作者
请选择
请选择
确定
取消

提示

该栏目需要登录且有访问权限才可以访问

如果您有访问权限,请直接 登录访问

如果您没有访问权限,请联系管理员申请开通

管理员联系邮箱:yun@hnwdkj.com