2009 International Conference on Multimedia Information Networking and Security 2009
DOI: 10.1109/mines.2009.37
|View full text |Cite
|
Sign up to set email alerts
|

A Portable TPM Scheme for General-Purpose Trusted Computing Based on EFI

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2010
2010
2015
2015

Publication Types

Select...
2
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 1 publication
0
2
0
Order By: Relevance
“…In order to resolve the two aforementioned problems, a new node multiple keys management for MANETs based on next generation protected storage of portable trusted platform module (PTPM.Nexts) and ID‐based encryption (IBE) is presented. Portable trusted platform module (PTPM) is viewed as functionally equivalent to a high‐performance USB key, and its trusted model and protected storage are based on trusted platform module (TPM) defined by the trusted computing group . However, PTPM is more flexible and portable than TPM to be used in mobile computing platform.…”
Section: Introductionmentioning
confidence: 99%
“…In order to resolve the two aforementioned problems, a new node multiple keys management for MANETs based on next generation protected storage of portable trusted platform module (PTPM.Nexts) and ID‐based encryption (IBE) is presented. Portable trusted platform module (PTPM) is viewed as functionally equivalent to a high‐performance USB key, and its trusted model and protected storage are based on trusted platform module (TPM) defined by the trusted computing group . However, PTPM is more flexible and portable than TPM to be used in mobile computing platform.…”
Section: Introductionmentioning
confidence: 99%
“…The importance of the information to be hidden can make these challenges bearable. These difficulties lead to procedural mistakes [6][7][8]. In particular, a rush for encryptions causes cessation of work, which may result in serious security vulnerabilities.…”
Section: Introductionmentioning
confidence: 99%