Method of designing security protocol for remote attestation
By the introduction of the natural law of survival of the fittest,an improved method of automatically designing cryptographic protocols was proposed.This method regards BAN-like logic as a basic tool to describe them,construct a fitness function to assess the performance of individuals systematicall...
Saved in:
Main Authors: | YU Rong-wei1, WANG Li-na1, KUANG Bo1 |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2008-01-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/74654101/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Design and validation for a remote attestation security protocol
by: WANG Dan, et al.
Published: (2009-01-01) -
On privacy of property-based remote attestation
by: LI Shang-jie1, et al.
Published: (2009-01-01) -
Research of platform identity attestation based on trusted chip
by: Qian-ying ZHANG, et al.
Published: (2014-08-01) -
Improved direct anonymous attestation scheme for mobile computing platforms
by: Li YANG, et al.
Published: (2013-06-01) -
Remote attestation scheme for cloud platform based on double-layer unbalanced hash tree
by: Xing RONG, et al.
Published: (2017-09-01)