DocumentCode :
3067804
Title :
Research of Privacy Protection Mechanism of TPM
Author :
Xueyong, Li ; Zhihui, Feng ; Junhui, Fu ; Wenxian, Xiao
Author_Institution :
Sch. of Inf. Eng., Henan Inst. of Sci. & Technol., Xinxiang, China
Volume :
3
fYear :
2010
fDate :
16-18 July 2010
Firstpage :
234
Lastpage :
236
Abstract :
Introduced the credible computation´s background and analyzed the TCG organization had Issued two authentication standard agreement: The trusted third party agreement and the direct anonymous authentication agreement, practice prove that the direct anonymous authentication agreement cannot be under the very good control in actual anonymous, this article proposed the improvement mentality in the original foundation, and provides the reference for the later research.
Keywords :
data privacy; security of data; standards; TCG organization; TPM; authentication standard agreement; direct anonymous authentication agreement; privacy protection mechanism; trusted computing group; trusted platform module; trusted third party agreement; Authentication; Computational modeling; Computers; Privacy; Protocols; Public key; DDA; TPM; TTP; trusted computing;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information Technology and Applications (IFITA), 2010 International Forum on
Conference_Location :
Kunming
Print_ISBN :
978-1-4244-7621-3
Electronic_ISBN :
978-1-4244-7622-0
Type :
conf
DOI :
10.1109/IFITA.2010.334
Filename :
5634651
Link To Document :
بازگشت