Trusted computing introduces the Trusted Platform Module (TPM) as a root of trust on an otherwise untrusted computer. The TPM can be used to restrict the use of cryptographic keys to trusted states, i.e., to situations in which the computer runs trusted software. This allows for the distribution of intellectual property or secrets to a remote party with a reasonable security that such secrets will not be obtained by a malicious or compromised client. We model a specific protocol for the distribution of secrets proposed by Sevine et al. A formal analysis using the NuSMV model checker shows that the protocol allows an intruder to give the client an arbitrary secret, without the client noticing. We propose an alternative that prevents this sce...
The Trusted Platform Module (TPM) is an international standard for a security chip that can be used ...
Revelations in the Snowden case have raised hard questions about the trust of Trusted Computing (TC)...
Trusted computing is gaining an increasing acceptance in the industry and finding its way to cloud c...
Abstract. We present a protocol that allows servers to securely distribute secrets to trusted platfo...
Abstract. We present a protocol that allows servers to securely distribute secrets to trusted platfo...
Trusted platform modules (TPMs) are hardware modules that are bound to a computer's motherboard, tha...
We consider the problem of providing trusted computing functionality in high availability systems. W...
The Trusted Computing Group (TCG) has introduced the Trusted Platform Module (TPM) as a solution to ...
Information security presents a huge challenge for both individuals and organizations. The Trusted C...
International audienceWe present a Horn-clause-based framework for analysing security protocols that...
Trusted Computing, as viewed by the Trusted Computing Group (TCG), promises to solve a num-ber of pr...
Security controls (such as encryption endpoints, payment gateways, and firewalls) rely on correct pr...
This paper examines a model of trusted computing wherein a computing platform is able to make assert...
This thesis deals with the analysis and design of trusted computing platforms. Trusted computing tec...
Revelations in the Snowden case have raised hard questions about the trust of Trusted Computing (TC)...
The Trusted Platform Module (TPM) is an international standard for a security chip that can be used ...
Revelations in the Snowden case have raised hard questions about the trust of Trusted Computing (TC)...
Trusted computing is gaining an increasing acceptance in the industry and finding its way to cloud c...
Abstract. We present a protocol that allows servers to securely distribute secrets to trusted platfo...
Abstract. We present a protocol that allows servers to securely distribute secrets to trusted platfo...
Trusted platform modules (TPMs) are hardware modules that are bound to a computer's motherboard, tha...
We consider the problem of providing trusted computing functionality in high availability systems. W...
The Trusted Computing Group (TCG) has introduced the Trusted Platform Module (TPM) as a solution to ...
Information security presents a huge challenge for both individuals and organizations. The Trusted C...
International audienceWe present a Horn-clause-based framework for analysing security protocols that...
Trusted Computing, as viewed by the Trusted Computing Group (TCG), promises to solve a num-ber of pr...
Security controls (such as encryption endpoints, payment gateways, and firewalls) rely on correct pr...
This paper examines a model of trusted computing wherein a computing platform is able to make assert...
This thesis deals with the analysis and design of trusted computing platforms. Trusted computing tec...
Revelations in the Snowden case have raised hard questions about the trust of Trusted Computing (TC)...
The Trusted Platform Module (TPM) is an international standard for a security chip that can be used ...
Revelations in the Snowden case have raised hard questions about the trust of Trusted Computing (TC)...
Trusted computing is gaining an increasing acceptance in the industry and finding its way to cloud c...