Proceedings of the 9th International Conference on Computer Systems and Technologies and Workshop for PhD Students in Computing 2008
DOI: 10.1145/1500879.1500961
|View full text |Cite
|
Sign up to set email alerts
|

Data protection utilizing trusted platform module

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2009
2009
2013
2013

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 1 publication
0
2
0
Order By: Relevance
“…TPM is to store information securely using encryption, decryption and signing-keys, digital certificates or similar secrets. Where all critical cryptographic operations are performed in a protected area and it is impossible for an attacker to attack them [20]. Trusted Platform Module is hardware chip that safeguards digital certificates, passwords and other important sensitive credentials of users.…”
Section: Rsa Transactionmentioning
confidence: 99%
“…TPM is to store information securely using encryption, decryption and signing-keys, digital certificates or similar secrets. Where all critical cryptographic operations are performed in a protected area and it is impossible for an attacker to attack them [20]. Trusted Platform Module is hardware chip that safeguards digital certificates, passwords and other important sensitive credentials of users.…”
Section: Rsa Transactionmentioning
confidence: 99%
“…The operation of sealing and unsealing in TCG Specification is shown in Fig.1. The first job of sealing is to calculate the hash value of the Data [6] [8] , and the result is StortedDigest. The calculation formula is shown as follow:…”
Section: Analysis Of Existing Schemementioning
confidence: 99%