Proceedings of the 11th ACM conference on Computer and communications security
Attestation-based policy enforcement for remote access
Proceedings of the 11th ACM conference on Computer and communications security
Open-Source Applications of TCPA Hardware
ACSAC '04 Proceedings of the 20th Annual Computer Security Applications Conference
Trusted Computing Platforms: Design and Applications
Trusted Computing Platforms: Design and Applications
Peer-to-peer access control architecture using trusted computing technology
Proceedings of the tenth ACM symposium on Access control models and technologies
Trusted Computing Platforms: TCPA Technology in Context
Trusted Computing Platforms: TCPA Technology in Context
Enhancing Data Authenticity and Integrity in P2P Systems
IEEE Internet Computing
Secure information sharing enabled by Trusted Computing and PEI models
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
Trusted Computing (Professional Applications of Computing) (Professional Applications of Computing)
Trusted Computing (Professional Applications of Computing) (Professional Applications of Computing)
Design and implementation of a TCG-based integrity measurement architecture
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
Electronic Notes in Theoretical Computer Science (ENTCS)
Controlling access to documents: a formal access control model
ETRICS'06 Proceedings of the 2006 international conference on Emerging Trends in Information and Communication Security
Self-encryption scheme for data security in mobile devices
CCNC'09 Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference
TPM meets DRE: reducing the trust base for electronic voting using trusted platform modules
IEEE Transactions on Information Forensics and Security - Special issue on electronic voting
Executing mobile applications on the cloud: Framework and issues
Computers & Mathematics with Applications
Migrating Android Applications to the Cloud
International Journal of Grid and High Performance Computing
Hi-index | 0.01 |
We present a protocol that allows servers to securely distribute secrets to trusted platforms. The protocol maintains the confidentiality of secrets in the face of eavesdroppers and careless users. Given an ideal (tamper-proof) trusted platform, the protocol can even withstand attacks by dishonest users. As an example of its use, we present an application to secure document processing.