A log-based key authorization management scheme for trusted computing platform | IEEE Conference Publication | IEEE Xplore