Automated Proof for Authorization Protocols of TPM 2.0 in Computational Model

Weijin Wang, Yu Qin, Dengguo Feng. Automated Proof for Authorization Protocols of TPM 2.0 in Computational Model. In Xinyi Huang, Jianying Zhou, editors, Information Security Practice and Experience - 10th International Conference, ISPEC 2014, Fuzhou, China, May 5-8, 2014. Proceedings. Volume 8434 of Lecture Notes in Computer Science, pages 144-158, Springer, 2014. [doi]

Abstract

Abstract is missing.