2014 11th International Computer Conference on Wavelet Actiev Media Technology and Information Processing(ICCWAMTIP) 2014
DOI: 10.1109/iccwamtip.2014.7073419
|View full text |Cite
|
Sign up to set email alerts
|

The remote attestation design based on the identity and attribute certificates

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 10 publications
0
2
0
Order By: Relevance
“…To overcome the flaw in binary remote attestation, Chen and other scholars firstly proposed a property based attestation protocol, PBA protocol [19]. Later, PBA protocol was further studied, and more remote attestation methods based on properties were proposed [20][21][22][23][24]. So far, property based remote attestation solution has currently been viewed as being the most valuable and prosperous for remote attestation, which overcomes the problems in binary remote attestation such as complexity, privacy, misuse of proof, and other defects.…”
Section: A Scenario For Remote Attestation Based On the Reverse Integrity Verification Methodsmentioning
confidence: 99%
“…To overcome the flaw in binary remote attestation, Chen and other scholars firstly proposed a property based attestation protocol, PBA protocol [19]. Later, PBA protocol was further studied, and more remote attestation methods based on properties were proposed [20][21][22][23][24]. So far, property based remote attestation solution has currently been viewed as being the most valuable and prosperous for remote attestation, which overcomes the problems in binary remote attestation such as complexity, privacy, misuse of proof, and other defects.…”
Section: A Scenario For Remote Attestation Based On the Reverse Integrity Verification Methodsmentioning
confidence: 99%
“…T.Syed et al [17] propose effective solutions for increasing scalability of mechanisms for remote attestation of device sets by using Big Data technology, including using multiprocessor systems [18], property based authentication mechanisms [19] and characteristics of these properties [20].…”
Section: Related Workmentioning
confidence: 99%