首页 | 本学科首页   官方微博 | 高级检索  
     


The mechanism about key and credential on trusted computing platform and the application study
Authors:Zhen Zhidong  Zhang Huanguo  Zhang Miao  Yan Fei  Zhang Liqiang
Affiliation:(1) School of Computer, Wuhan University, 430072 Wuhan, Hubei, China
Abstract:Trusted Computing technology is quickly developing in recent years. This technology manages to improve the computer security and archive a trusted computing environment. The core of trusted computing technology is cryptology. In this paper, we analyze the key and credential mechanism which is two basic aspects in the cryptology application of trusted computing. We give an example application to illustrate that the TPM enabled key and credential mechanism can improve the security of computer system.
Keywords:trusted computing  trusted platform module (TPM)  key management  credential
本文献已被 CNKI 维普 万方数据 SpringerLink 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号