Model checking of trusted cryptographic module
The formal security analysis was given for the trusted cryptographic module according to the specification of the trusted cryptographic module using model checking tools. The flaws in the AP protocol were pointed and the solution was given. Meanwhile, the framework was proposed for analyzing the sec...
Saved in:
Main Authors: | CHEN Xiao-feng, FENG Deng-guo |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2010-01-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/74649158/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Research of a trusted execution environment module for multiple platforms
by: Qian-ying ZHANG, et al.
Published: (2014-11-01) -
Research on semantics of trust transitivity in cryptographic primitives
by: WANG Li-cheng1, et al.
Published: (2008-01-01) -
Analyzing the trust chain of trusted virtualization platform based on the extended LS<sup>2</sup>
by: De-xian CHANG, et al.
Published: (2013-05-01) -
New extension method of trusted certificate chain in virtual platform environment
by: Liang TAN, et al.
Published: (2018-06-01) -
A Conceptual Model for Claim Validation Based on Cryptographically Signed Data
by: Ryosuke Abe, et al.
Published: (2025-01-01)