The Integration of Trusted Platform Modules into a Tactical Identity Management System
暂无分享,去创建一个
[1] Anders Fongen,et al. Architecture Patterns for a Ubiquitous Identity Management System , 2011 .
[2] Russ Housley,et al. Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile , 2002, RFC.
[3] Andreas Leicher,et al. Implementation of a Trusted Ticket System , 2009, SEC.
[4] Scott A. Rotondo. Trusted Computing Group , 2011, Encyclopedia of Cryptography and Security.
[5] Martin Pirker,et al. A PrivacyCA for Anonymity and Trust , 2009, TRUST.
[6] Andreas Leicher,et al. Trusted Computing enhanced OpenID , 2010, 2010 International Conference for Internet Technology and Secured Transactions.
[7] Chris J. Mitchell,et al. Single Sign-On Using Trusted Platforms , 2003, ISC.
[8] Mohammad Nauman,et al. Specification and Standardization of a Java Trusted Computing API , 2012, Softw. Pract. Exp..
[9] Ulrich Ultes-Nitsche,et al. A Proof-of-Concept Implementation of EAP-TLS with TPM Support , 2008, ISSA.