A New Method of Performance Estimate of Direct Anonymous Attestation Scheme in TCG
Liang Tan, W. Meng, Zhou Ming-tian
openalex +3 more sources
Application of Direct Anonymous Attestation to the Ad Hoc Networks Security
Tao Zhang, Shuai Ren
semanticscholar +3 more sources
Direct Anonymous Attestation for Next Generation TPM
Trusted computing platforms have been proposed as a promising approach to enhance the security of general-purpose computing systems. Direct Anonymous Attestation(DAA) is a scheme that allows a Trusted Platform Module (TPM) which is the core component of the trusted computing platform to remotely convince a communication partner that it is indeed a ...
Xiaofeng Chen, Dengguo Feng
openaire +2 more sources
k-times attribute-based authentication scheme using direct anonymous attestation
s: At present, the main drawbacks of existing k-times attribute-based authentication (abbreviated to k-TABA) schemes and related attribute-based authentication schemes are that the computation cost of the authentication process depends on the size of the
Xin LIU+3 more
doaj +2 more sources
Direct anonymous authentication scheme for wireless networks under trusted computing
Based on direct anonymous attestation of trusted computing,a wireless anonymous authentication scheme was proposed,the platform of the mobile node was verified by the foreign network agent and the identity of the mobile node user was authenticated by the
YANG Li1+3 more
doaj +2 more sources
Lightweight multi-coupon system for multi-merchant environments with DAA
A multi-coupon system for multi-merchant environments was proposed by extending the DAA (direct anonymous attestation) scheme of Brickell etc.The new system bound the key elements in multi-coupon with the tamper-resistant TPM(trusted platform module)chip,
Xin LIU, Qiu-liang XU, Bo ZHANG
doaj +2 more sources
Zero-Knowledge in the Applied Pi-calculus and Automated Verification of the Direct Anonymous Attestation Protocol [PDF]
Michael Backes+2 more
openalex +2 more sources
A Security Framework for Increasing Data and Device Integrity in Internet of Things Systems. [PDF]
Dirin A, Oliver I, Laine TH.
europepmc +1 more source
RESEKRA: Remote Enrollment Using SEaled Keys for Remote Attestation. [PDF]
Gómez-Marín E+5 more
europepmc +1 more source
Privacy-Preserving Blockchain Technologies. [PDF]
Valadares DCG+4 more
europepmc +1 more source