Extending TLS with mutual attestation for platform integrity assurance
Normally, secure communication between client-server applications is established using secure channel technologies such as Transport Layer Security (TLS). TLS is cryptographic protocol which ensures secure transmission of data and authenticity of communication at each endpoint platform. However, the...
| Main Authors: | Abdul Aziz, Nor Azah, Udzir, Nur Izura, Mahmod, Ramlan |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Engineering and Technology Publishing
2014
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/37590/ http://psasir.upm.edu.my/id/eprint/37590/1/Extending%20TLS%20with%20mutual%20attestation%20for%20platform%20integrity%20assurance.pdf |
Similar Items
Performance analysis for extended TLS with mutual attestation for platform integrity assurance
by: Abd Aziz, Norazah, et al.
Published: (2014)
by: Abd Aziz, Norazah, et al.
Published: (2014)
Improved TLS protocol for platform integrity assurance using mutual attestation
by: Abd Aziz, Norazah
Published: (2014)
by: Abd Aziz, Norazah
Published: (2014)
Mutual remote attestation in IPSec based VPN.
by: Abd Aziz, Norazah, et al.
Published: (2012)
by: Abd Aziz, Norazah, et al.
Published: (2012)
Mutual remote attestation in IPSec based VPN
by: Abd Aziz, Norazah, et al.
Published: (2013)
by: Abd Aziz, Norazah, et al.
Published: (2013)
Mutual attestation and integrity verification of RFID system using trusted platform module (TPM) / Mohd Faizal Mubarak
by: Mubarak, Mohd Faizal
Published: (2010)
by: Mubarak, Mohd Faizal
Published: (2010)
Platform Property Certificate for Property-Based Attestation Model
by: Borhan, Nazanin
Published: (2011)
by: Borhan, Nazanin
Published: (2011)
Strategic IT Outsourcing : An Exploration for “Mutually Assured Success”
by: Sia, Choon Long
Published: (2013)
by: Sia, Choon Long
Published: (2013)
3D geospatial database from terrestrial /laser scanning (TLS) data
by: Abdul Rahman, Alias, et al.
Published: (2008)
by: Abdul Rahman, Alias, et al.
Published: (2008)
File integrity monitor scheduling based on file security level classification
by: Abdullah, Zul Hilmi, et al.
Published: (2011)
by: Abdullah, Zul Hilmi, et al.
Published: (2011)
Towards a dynamic file integrity monitor through a security classification
by: Abdullah, Zul Hilmi, et al.
Published: (2011)
by: Abdullah, Zul Hilmi, et al.
Published: (2011)
Quantification of terrestrial laser scanner (TLS) elevation accuracy in oil palm plantation for IFSAR improvement
by: Muhadi , N. A., et al.
Published: (2016)
by: Muhadi , N. A., et al.
Published: (2016)
Detection of TLS plantlets of oil palm using specific grda markers via pcr approach
by: Wong, Connie Ting Ting
Published: (2015)
by: Wong, Connie Ting Ting
Published: (2015)
Deformation monitoring of a steel structure using 3D terrestrial laser scanner (TLS)
by: Jatmiko, -, et al.
Published: (2017)
by: Jatmiko, -, et al.
Published: (2017)
A XML based, user-centered privacy model in pervasive
computing systems
by: Dehghantanha, Ali, et al.
Published: (2009)
by: Dehghantanha, Ali, et al.
Published: (2009)
A secure and privacy preserving iris biometric authentication scheme with matrix transformation
by: Udzir, Nur Izura, et al.
Published: (2017)
by: Udzir, Nur Izura, et al.
Published: (2017)
Towards green frameworks for digital forensics investigation
by: Dehghantanha, Ali, et al.
Published: (2013)
by: Dehghantanha, Ali, et al.
Published: (2013)
Towards data centric mobile security
by: Dehghantanha, Ali, et al.
Published: (2011)
by: Dehghantanha, Ali, et al.
Published: (2011)
Attestation audits revisited : how about performance audits for public companies? / Haji Shafi Mohamad
by: Mohamad, Shafi
Published: (2004)
by: Mohamad, Shafi
Published: (2004)
Perlembagaan kerajaan Perak attestasi kedaulatan watan
[Constitution of the government of Perak as the attestation to the indegenous sovereignty]
by: Wan Ahmad Fauzi, Wan Husain
Published: (2021)
by: Wan Ahmad Fauzi, Wan Husain
Published: (2021)
An oblique-matrix technique for data integrity assurance
by: Ghaeb, Jasin Abdullah, et al.
Published: (2009)
by: Ghaeb, Jasin Abdullah, et al.
Published: (2009)
Sharp-edges method in Arabic text steganography
by: Roslan, Nuur Alifah, et al.
Published: (2011)
by: Roslan, Nuur Alifah, et al.
Published: (2011)
Performance evaluation of identity-based encryption (IBE) remote attestation protocol in wireless sensor networks / Roszainiza Rosli
by: Rosli, Roszainiza
Published: (2014)
by: Rosli, Roszainiza
Published: (2014)
Are Australian Universities Engaging with their Annual Freedom of Speech and Academic Freedom Attestation Statements so as to Achieve their Intended Purposes?
by: Levine, Pnina
Published: (2024)
by: Levine, Pnina
Published: (2024)
A Machine Learning Classification Approach To Detect Tls-Based Malware Using Entropy-Based Flow Set Features
by: Keshkeh, Kinan
Published: (2022)
by: Keshkeh, Kinan
Published: (2022)
Modified shielding function for multi-biometric authentication and template protection / Abayomi Jegede ... [et al.]
by: Jegede, Abayomi, et al.
Published: (2017)
by: Jegede, Abayomi, et al.
Published: (2017)
State of the art in biometric key binding and key generation schemes
by: Jegede, Abayomi, et al.
Published: (2017)
by: Jegede, Abayomi, et al.
Published: (2017)
Modified shielding function for multi-biometric authentication and template protection
by: Jegede, Abayomi, et al.
Published: (2017)
by: Jegede, Abayomi, et al.
Published: (2017)
Cancelable and hybrid biometric cryptosystems: current directions and open research issues
by: Jegede, Abayomi, et al.
Published: (2017)
by: Jegede, Abayomi, et al.
Published: (2017)
Revocable and non-invertible multibiometric template protection based on matrix transformation
by: Jegede, Abayomi, et al.
Published: (2018)
by: Jegede, Abayomi, et al.
Published: (2018)
News consumption through SNS platforms:Extended motivational model
by: Ahmed, Ismail Sheikh Yusuf, et al.
Published: (2018)
by: Ahmed, Ismail Sheikh Yusuf, et al.
Published: (2018)
Buffer overflow attack mitigation via Trusted Platform Module (TPM)
by: Teh, Jia Yew, et al.
Published: (2014)
by: Teh, Jia Yew, et al.
Published: (2014)
Quality assurance
by: ., Maryanto, et al.
Published: (2015)
by: ., Maryanto, et al.
Published: (2015)
UPEM : user-centered privacy evaluation model in pervasive computing system.
by: Dehghantanha, Ali, et al.
Published: (2009)
by: Dehghantanha, Ali, et al.
Published: (2009)
UPEM : user-centered privacy evaluation model in pervasive computing systems.
by: Dehghantanha, Ali, et al.
Published: (2009)
by: Dehghantanha, Ali, et al.
Published: (2009)
Model-based system architecture for preventing XPath injection in database-centric web services environment
by: Asmawi, Aziah, et al.
Published: (2012)
by: Asmawi, Aziah, et al.
Published: (2012)
A new approach to data encryption based on the synchronous stream cipher with bit-level diffusion
by: Muda, Zaiton, et al.
Published: (2013)
by: Muda, Zaiton, et al.
Published: (2013)
XIPS : a model-based prevention mechanism for preventing blind XPath injection in database-centric web services environment.
by: Asmawi, Aziah, et al.
Published: (2013)
by: Asmawi, Aziah, et al.
Published: (2013)
Implementing severity factor to mitigate malicious insider
by: Asmawi, Aziah, et al.
Published: (2019)
by: Asmawi, Aziah, et al.
Published: (2019)
Systematic literature review and analysis for Arabic text steganography method practically
by: Roslan, Nuur Alifah, et al.
Published: (2022)
by: Roslan, Nuur Alifah, et al.
Published: (2022)
Analysis of integrity tests for checking integrity constraints in a distributed database
by: Alwan, Ali Amer, et al.
Published: (2007)
by: Alwan, Ali Amer, et al.
Published: (2007)
Similar Items
-
Performance analysis for extended TLS with mutual attestation for platform integrity assurance
by: Abd Aziz, Norazah, et al.
Published: (2014) -
Improved TLS protocol for platform integrity assurance using mutual attestation
by: Abd Aziz, Norazah
Published: (2014) -
Mutual remote attestation in IPSec based VPN.
by: Abd Aziz, Norazah, et al.
Published: (2012) -
Mutual remote attestation in IPSec based VPN
by: Abd Aziz, Norazah, et al.
Published: (2013) -
Mutual attestation and integrity verification of RFID system using trusted platform module (TPM) / Mohd Faizal Mubarak
by: Mubarak, Mohd Faizal
Published: (2010)