Security Analysis and Improvement of the TPM's Two Main Authorization Protocols
暂无分享,去创建一个
The main function of trusted computing is done by the trusted platform module.For the working of TPM is based on the OIAP and OSAP protocol,it is most important to ensure the secure working of the two protocols.This article does logic description and security analysis on the two protocols,then presents some ways to protect the two protocols from being attacked.