Revocation of TPM Keys
暂无分享,去创建一个
[1] Srinivas Devadas,et al. Virtual monotonic counters and count-limited objects using a TPM without a trusted OS , 2006, STC '06.
[2] Xiaojiang Du,et al. A survey of key management schemes in wireless sensor networks , 2007, Comput. Commun..
[3] Radek Vingralek,et al. How to build a trusted database system on untrusted storage , 2000, OSDI.
[4] Ernest F. Brickell,et al. Direct anonymous attestation , 2004, CCS '04.
[5] Berk Sunar,et al. Cryptographic Hardware and Embedded Systems - CHES 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings , 2005, CHES.
[6] Moni Naor,et al. Certificate revocation and certificate update , 1998, IEEE Journal on Selected Areas in Communications.
[7] Ahmad-Reza Sadeghi,et al. Secure Data Management in Trusted Computing , 2005, CHES.