2017
DOI: 10.1002/cpe.4350
|View full text |Cite
|
Sign up to set email alerts
|

Property‐based token attestation in mobile computing

Abstract: The surge of the presence of personal mobile devices in multi-environment makes a significant attention to the mobile cloud computing (MCC). Along with this concern, security issues also appear as a barrier to prevent the propagation of this trend. This paper focuses on an important feature in many security protocols and application, which is the device attestation in the MCC.The existing remote attestation mechanisms are currently used in trusted computing environment such as binary attestation and property-b… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 36 publications
(60 reference statements)
0
1
0
Order By: Relevance
“…Previous researchers have studied confidentiality requirements based on cryptographic techniques. For example, Vinh et al [56] implemented property-based token attestation (PTA) to protect users and company networks in BYOD environments. These data are processed as binary and property-based attestation and the method is effective in data storage units in enterprises.…”
Section: B Cryptographic Techniques Based On Confidentiality Requirem...mentioning
confidence: 99%
“…Previous researchers have studied confidentiality requirements based on cryptographic techniques. For example, Vinh et al [56] implemented property-based token attestation (PTA) to protect users and company networks in BYOD environments. These data are processed as binary and property-based attestation and the method is effective in data storage units in enterprises.…”
Section: B Cryptographic Techniques Based On Confidentiality Requirem...mentioning
confidence: 99%
“…Vinh et al investigate the security aspects of mobile cloud computing. One of the key challenges highlighted in this work is the assurance of trust on mobile devices, which play a key role in mobile cloud computing.…”
Section: Themes Of the Special Issuementioning
confidence: 99%