• Complex
  • Title
  • Keyword
  • Abstract
  • Scholars
  • Journal
  • ISSN
  • Conference
搜索

Author:

Gong, Bei (Gong, Bei.) (Scholars:公备) | Liu, Xian-Gang (Liu, Xian-Gang.) | Zhuang, Jun-Xi (Zhuang, Jun-Xi.)

Indexed by:

EI Scopus PKU CSCD

Abstract:

In order to prevent a malicious terminal of a group identifying itself and group fraud to others, in this paper, a TPM identification scheme based on threshold policy is presented. Its security is based on computational DH problem (CDHP) and K-CAA problem, which can effectively prevent a malicious terminal of a group identifying itself and group fraud to others. The scheme also fully takes into account the limited computing power of TPM to enhance its computing efficiency.

Keyword:

Research Crime Engineering

Author Community:

  • [ 1 ] [Gong, Bei]College of Computer Science, Beijing University of Technology, Beijing 100124, China
  • [ 2 ] [Liu, Xian-Gang]College of Computer Science, Beijing University of Technology, Beijing 100124, China
  • [ 3 ] [Zhuang, Jun-Xi]College of Computer Science, Beijing University of Technology, Beijing 100124, China

Reprint Author's Address:

Email:

Show more details

Related Keywords:

Related Article:

Source :

Journal of Beijing University of Technology

ISSN: 0254-0037

Year: 2010

Issue: SUPPL. 2

Volume: 36

Page: 40-42

Cited Count:

WoS CC Cited Count:

SCOPUS Cited Count:

ESI Highly Cited Papers on the List: 0 Unfold All

WanFang Cited Count:

Chinese Cited Count:

30 Days PV: 0

Online/Total:995/5358020
Address:BJUT Library(100 Pingleyuan,Chaoyang District,Beijing 100124, China Post Code:100124) Contact Us:010-67392185
Copyright:BJUT Library Technical Support:Beijing Aegean Software Co., Ltd.