Proceedings of the 17th ACM Conference on Computer and Communications Security 2010
DOI: 10.1145/1866307.1866419
|View full text |Cite
|
Sign up to set email alerts
|

A portable TPM based on USB key

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2013
2013
2021
2021

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(2 citation statements)
references
References 1 publication
0
2
0
Order By: Relevance
“…Many scholars put forward the construction technology of virtual trusted root in cloud environment [30][31][32]. For some industrial control systems without TPM, the trusted root based on USB can be used, which can also bring the expected effect [33,34].…”
Section: Dynamic Length Trust Chainmentioning
confidence: 99%
“…Many scholars put forward the construction technology of virtual trusted root in cloud environment [30][31][32]. For some industrial control systems without TPM, the trusted root based on USB can be used, which can also bring the expected effect [33,34].…”
Section: Dynamic Length Trust Chainmentioning
confidence: 99%
“…In order to resolve the two aforementioned problems, a new node multiple keys management for MANETs based on next generation protected storage of portable trusted platform module (PTPM.Nexts) and ID‐based encryption (IBE) is presented. Portable trusted platform module (PTPM) is viewed as functionally equivalent to a high‐performance USB key, and its trusted model and protected storage are based on trusted platform module (TPM) defined by the trusted computing group . However, PTPM is more flexible and portable than TPM to be used in mobile computing platform.…”
Section: Introductionmentioning
confidence: 99%