Indexed by:
Abstract:
The trusted computing technology are developing gradually, and was applied in the network So the trusted network is been proposed and researched, and method of remote attestation is the key technique in the study. According to current situation of study, outline several system of the trusted network nowadays, and analyzed the basic ideas and implementations of several typical remote attestation methods, compared and analyzed their advantages and disadvantages. At the same time pointed out the applicable occasions of several remote attestation methods, putted forward some insufficient for these remote attestation methods, and pointed out the direction for the future of remote attestation.
Keyword:
Reprint Author's Address:
Email:
Source :
2013 FOURTH INTERNATIONAL CONFERENCE ON DIGITAL MANUFACTURING AND AUTOMATION (ICDMA)
ISSN: 2162-0571
Year: 2013
Page: 192-195
Language: English
Cited Count:
WoS CC Cited Count: 1
SCOPUS Cited Count: 3
ESI Highly Cited Papers on the List: 0 Unfold All
WanFang Cited Count:
Chinese Cited Count:
30 Days PV: 3
Affiliated Colleges: