By Topic

Trusted Transmission Protocol for Content Security

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Li Li ; Dept. of Comput. Sci. & Technol., Tongji Univ., Shanghai ; Guosun Zeng ; Bo Chen

Classic message exchange based on asymmetric cryptography can protect message content from tampering and authenticate terminal by signing with the private key. Keys are communication endpoint spsila improperly managed keys can result in loss of security during content transmission. Additionally, improperly configured endpoints may also threaten content security of storage. Certainly the security can be enhanced by providing both security key management and terminalpsilas security authentication mechanisms. Those mechanisms can be obtained from trusted PC architecture specified by trusted computing group. So based on the new development of those mechanisms, such as property-based sealing, we adopted some cryptography schemes and initiated a security provably trusted transmission protocol, which not only enhances the content security during transmission, but also ensures content security of storage.

Published in:

Young Computer Scientists, 2008. ICYCS 2008. The 9th International Conference for

Date of Conference:

18-21 Nov. 2008