Future of Trust in Computing 2009
DOI: 10.1007/978-3-8348-9324-6_4
|View full text |Cite
|
Sign up to set email alerts
|

Smart Cards and remote entrusting

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2010
2010
2016
2016

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 2 publications
0
1
0
Order By: Relevance
“…Related to but not to be confused with the remote trust authentication problem discussed in Sec. 1 is the problem of remote entrusting [20,3,5], a more general computer security problem in which an application running on an untrusted device requests resources from a remote entity. Solving the remote trust authentication problem does not solve the remote entrusting problem, because establishing that a user is authentic does not ensure that the device has not been compromised by malware.…”
Section: Introductionmentioning
confidence: 99%
“…Related to but not to be confused with the remote trust authentication problem discussed in Sec. 1 is the problem of remote entrusting [20,3,5], a more general computer security problem in which an application running on an untrusted device requests resources from a remote entity. Solving the remote trust authentication problem does not solve the remote entrusting problem, because establishing that a user is authentic does not ensure that the device has not been compromised by malware.…”
Section: Introductionmentioning
confidence: 99%