Abstract
Trusted computing has been proposed to enhance the security of computing environment in disparate computer platforms. Remote attestation is necessary to prove integrity and authenticity of system environments. Stumpf et al. propose a robust integrity reporting protocol for remote attestation. However, their protocol is not secure under fully adaptive party corruptions. In this paper, we propose a secure integrity reporting protocol for remote attestation under fully adaptive party corruptions.
Original language | English |
---|---|
Title of host publication | Future Wireless Networks and Information Systems |
Pages | 211-217 |
Number of pages | 7 |
Edition | VOL. 1 |
DOIs | |
Publication status | Published - 2012 |
Event | 2011 International Conference on Future Wireless Networks and Information Systems, ICFWI 2011 - Macao, China Duration: 30 Nov 2011 → 1 Dec 2011 |
Publication series
Name | Lecture Notes in Electrical Engineering |
---|---|
Number | VOL. 1 |
Volume | 143 LNEE |
ISSN (Print) | 1876-1100 |
ISSN (Electronic) | 1876-1119 |
Conference
Conference | 2011 International Conference on Future Wireless Networks and Information Systems, ICFWI 2011 |
---|---|
Country/Territory | China |
City | Macao |
Period | 30/11/11 → 1/12/11 |
Keywords
- Adaptive Party Corruptions
- Integrity Reporting Protocol
- Trusted Computing
Fingerprint
Dive into the research topics of 'A secure robust integrity reporting protocol of trusted computing for remote attestation under fully adaptive party corruptions'. Together they form a unique fingerprint.Cite this
Zhu, L., Zhang, Z., Liao, L., & Guo, C. (2012). A secure robust integrity reporting protocol of trusted computing for remote attestation under fully adaptive party corruptions. In Future Wireless Networks and Information Systems (VOL. 1 ed., pp. 211-217). (Lecture Notes in Electrical Engineering; Vol. 143 LNEE, No. VOL. 1). https://doi.org/10.1007/978-3-642-27323-0_27