Vulnerability Analysis for the Authentication Protocols in Trusted Computing Platforms and a Proposed Enhancement of the OffPAD Protocol

Trusted computing architecture ensures the behavior of software that runs on a user machine by protecting software-level attacks. Due to the potential of exposing a user's private information while accessing a system, many studies have focused on analyzing existing protocols to develop new meth...

Full description

Bibliographic Details
Main Authors: Mada Alhaidary, Sk Md Mizanur Rahman, Mohammed Zakariah, M. Shamim Hossain, Atif Alamri, Md Sarwar M Haque, B. B. Gupta
Format: Article
Language:English
Published: IEEE 2018-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/8245777/