Formal analysis of HMAC authorisation in the TPM2.0 specification
暂无分享,去创建一个
[1] Graham Steel,et al. A Formal Analysis of Authentication in the TPM , 2010, Formal Aspects in Security and Trust.
[2] Dengguo Feng,et al. Formal analysis of TPM2.0 key management APIs , 2014 .
[3] David A. Basin,et al. Automated Analysis of Diffie-Hellman Protocols and Advanced Security Properties , 2012, 2012 IEEE 25th Computer Security Foundations Symposium.
[4] Li Xi,et al. DAA-Related APIs in TPM 2.0 Revisited , 2014, TRUST.
[5] Jiangtao Li,et al. Flexible and scalable digital signatures in TPM 2.0 , 2013, CCS.
[6] Dengguo Feng,et al. Automated Proof for Authorization Protocols of TPM 2.0 in Computational Model , 2014, ISPEC.
[7] Robert Künnemann,et al. Automated Analysis of Security Protocols with Global State , 2014, 2014 IEEE Symposium on Security and Privacy.
[8] Mark Ryan,et al. Attack, Solution and Verification for Shared Authorisation Data in TCG TPM , 2009, Formal Aspects in Security and Trust.
[9] Dengguo Feng,et al. Type-Based Analysis of Protected Storage in the TPM , 2013, ICICS.
[10] Bo Zhao,et al. A formal analysis of Trusted Platform Module 2.0 hash-based message authentication code authorization under digital rights management scenario , 2016, Secur. Commun. Networks.
[11] Graham Steel,et al. Formal Analysis of Protocols Based on TPM State Registers , 2011, 2011 IEEE 24th Computer Security Foundations Symposium.
[12] Mattia Monga,et al. Replay attack in TCG specification and solution , 2005, 21st Annual Computer Security Applications Conference (ACSAC'05).
[13] Carsten Rudolph,et al. Security Evaluation of Scenarios Based on the TCG's TPM Specification , 2007, ESORICS.
[14] Mark Ryan,et al. Stateful Applied Pi Calculus , 2014, POST.
[15] Dengguo Feng,et al. Formal Analysis of Enhanced Authorization in the TPM 2.0 , 2015, AsiaCCS.