-
1
-
-
35248839965
-
A signature scheme with efficient protocols
-
Security in Communication Networks, Third International Conference, SCN 2002. Springer Verlag
-
J. Camenisch and A. Lysyanskaya. A signature scheme with efficient protocols. In Security in Communication Networks, Third International Conference, SCN 2002, volume 2576 of LNCS, pages 268-289. Springer Verlag, 2003.
-
(2003)
LNCS
, vol.2576
, pp. 268-289
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
2
-
-
14844295011
-
Direct anonymous attestation
-
V. Atluri, B. Pfitzmann, and P. McDaniel, editors, October
-
L. Chen, E. Brickell, and J. Camenisch. Direct anonymous attestation. In V. Atluri, B. Pfitzmann, and P. McDaniel, editors, Proceedings of 11th ACM Conference on Computer and Communications Security (CCS'04), October 2004.
-
(2004)
Proceedings of 11th ACM Conference on Computer and Communications Security (CCS'04)
-
-
Chen, L.1
Brickell, E.2
Camenisch, J.3
-
3
-
-
0038011186
-
A reputation-based approach for choosing reliable resources in peer-to-peer networks
-
V. Atluri, editor. ACM Press. ISBN 1-58113-612-9
-
E. Damiani, S. De Capitani di Vimercati, S. Paraboschi, P. Samarati, and F. Violante. A reputation-based approach for choosing reliable resources in peer-to-peer networks. In V. Atluri, editor, Proceedings of the 9th ACM conference on Computer and Communications Security, pages 207-216. ACM Press, 2002. ISBN 1-58113-612-9.
-
(2002)
Proceedings of the 9th ACM Conference on Computer and Communications Security
, pp. 207-216
-
-
Damiani, E.1
De Capitani Di Vimercati, S.2
Paraboschi, S.3
Samarati, P.4
Violante, F.5
-
4
-
-
35248845972
-
Open problems in data-sharing peer-to-peer systems
-
D. Calvanese, M. Lenzerini, and R. Motwani, editors, Proceedings of 9th International Conference on Database Theory (ICDT'03). Springer
-
N. Daswani, H. Garcia-Molina, and B. Yang. Open problems in data-sharing peer-to-peer systems. In D. Calvanese, M. Lenzerini, and R. Motwani, editors, Proceedings of 9th International Conference on Database Theory (ICDT'03), volume 2572 of LNCS, pages 1-15. Springer, 2003.
-
(2003)
LNCS
, vol.2572
, pp. 1-15
-
-
Daswani, N.1
Garcia-Molina, H.2
Yang, B.3
-
5
-
-
33845373082
-
The snakes of medusa - Internet identity subversion
-
L. Detweiler. The snakes of medusa - internet identity subversion, 1993. Cypherpunks mailing lists.
-
(1993)
Cypherpunks Mailing Lists
-
-
Detweiler, L.1
-
6
-
-
84947273682
-
The sybil attack
-
P. Druschel, M. F. Kaashoek, and A. I. T. Rowstron, editors, Peer-to-Peer systems, First International Workshop, IPTPS 2002. Springer
-
J.R. Douceur. The sybil attack. In P. Druschel, M. F. Kaashoek, and A. I. T. Rowstron, editors, Peer-to-Peer systems, First International Workshop, IPTPS 2002, volume 2429 of LNCS, pages 251-256. Springer, 2002.
-
(2002)
LNCS
, vol.2429
, pp. 251-256
-
-
Douceur, J.R.1
-
11
-
-
33845360717
-
-
Trusted Computing Group. TPM Main: Part 3 Commands, 1.2 edition, 2005. https: //www.trustedcomputinggroup.org/downloads/specifications.
-
(2005)
TPM Main: Part 3 Commands, 1.2 Edition
-
-
-
13
-
-
0012408597
-
SDSI: A simple distributed security infrastructure
-
presented at
-
R. Rivest and B. Lampson. SDSI: a simple distributed security infrastructure, 1996. presented at CRYPTO'96 Rumpsession.
-
(1996)
CRYPTO'96 Rumpsession
-
-
Rivest, R.1
Lampson, B.2
-
15
-
-
33845373081
-
A survey of peer-to-peer security issues
-
M. Okada, B. C. Pierce, A. Scedrov, H. Tokuda, and A. Yonezawa, editors, Software Security - Theories and Systems, International Symposium, ISSS 2002. Springer. ISBN 3-540-00708-3
-
D. S. Wallach. A survey of peer-to-peer security issues. In M. Okada, B. C. Pierce, A. Scedrov, H. Tokuda, and A. Yonezawa, editors, Software Security - Theories and Systems, International Symposium, ISSS 2002, volume 2609 of LNCS, pages 42-57. Springer, 2003. ISBN 3-540-00708-3.
-
(2003)
LNCS
, vol.2609
, pp. 42-57
-
-
Wallach, D.S.1
|