Protecting cryptographic keys and computations via virtual secure coprocessing
ACM SIGARCH Computer Architecture News - Special issue: Workshop on architectural support for security and anti-virus (WASSA)
Protecting browser state from web privacy attacks
Proceedings of the 15th international conference on World Wide Web
Design and implementation of a TCG-based integrity measurement architecture
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
A smart card solution for access control and trust management for nomadic users
CARDIS'06 Proceedings of the 7th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Applications
Design and implementation of a parallel crypto server
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II
Trusted computing enhanced user authentication with OpenID and trustworthy user interface
International Journal of Internet Technology and Secured Transactions
Hi-index | 0.00 |
Notwithstanding the adoption of strong cryptographic mechanisms, the anticipated degree of security in the protection and management of privacy sensitive data can only be achieved, if secret keys can be shielded adequately. In practice, most implementations are based on software tokens that shall guard the keys against eavesdropping. This fact alleviates the hardness of circumvention of used cryptographic protocols and with this the disclosure of secret keys. In this paper we propose a key management architecture which - based on the capabilities of Trusted Computing Technology - will provide a higher level of security.