DocumentCode
3067804
Title
Research of Privacy Protection Mechanism of TPM
Author
Xueyong, Li ; Zhihui, Feng ; Junhui, Fu ; Wenxian, Xiao
Author_Institution
Sch. of Inf. Eng., Henan Inst. of Sci. & Technol., Xinxiang, China
Volume
3
fYear
2010
fDate
16-18 July 2010
Firstpage
234
Lastpage
236
Abstract
Introduced the credible computation´s background and analyzed the TCG organization had Issued two authentication standard agreement: The trusted third party agreement and the direct anonymous authentication agreement, practice prove that the direct anonymous authentication agreement cannot be under the very good control in actual anonymous, this article proposed the improvement mentality in the original foundation, and provides the reference for the later research.
Keywords
data privacy; security of data; standards; TCG organization; TPM; authentication standard agreement; direct anonymous authentication agreement; privacy protection mechanism; trusted computing group; trusted platform module; trusted third party agreement; Authentication; Computational modeling; Computers; Privacy; Protocols; Public key; DDA; TPM; TTP; trusted computing;
fLanguage
English
Publisher
ieee
Conference_Titel
Information Technology and Applications (IFITA), 2010 International Forum on
Conference_Location
Kunming
Print_ISBN
978-1-4244-7621-3
Electronic_ISBN
978-1-4244-7622-0
Type
conf
DOI
10.1109/IFITA.2010.334
Filename
5634651
Link To Document