메뉴 건너뛰기




Volumn 232, Issue , 2007, Pages 443-448

Covert identity information in direct anonymous attestation (DAA)

Author keywords

[No Author keywords available]

Indexed keywords

DIRECT ANONYMOUS ATTESTATIONS; EFFICIENT PROTOCOLS; IDENTITY INFORMATION; PRIVACY ATTACKS; PRIVACY REQUIREMENTS; TRUSTED COMPUTING GROUPS; TRUSTED PLATFORM MODULE;

EID: 36248950111     PISSN: 15715736     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-0-387-72367-9_38     Document Type: Conference Paper
Times cited : (37)

References (6)
  • 1
    • 17444400745 scopus 로고    scopus 로고
    • trusted computing
    • frequently asked questions
    • R. Anderson. 'trusted computing' frequently asked questions. http://www.cl.cam.ac.uk/~rjal4/tcpa-faq.html, 2003.
    • (2003)
    • Anderson, R.1
  • 4
    • 35248839965 scopus 로고    scopus 로고
    • A signature scheme with efficient protocols
    • Security in Communication Networks, Third International Conference, SCN 2003, of, Springer Verlag
    • J. Camenisch and A. Lysyanskaya. A signature scheme with efficient protocols. In Security in Communication Networks, Third International Conference, SCN 2003, volume 2576 of Lecture Notes in Computer Science, pages 268-289. Springer Verlag, 2003.
    • (2003) Lecture Notes in Computer Science , vol.2576 , pp. 268-289
    • Camenisch, J.1    Lysyanskaya, A.2
  • 5
    • 36249005427 scopus 로고    scopus 로고
    • Trusted Computing Group, revision 94
    • Trusted Computing Group. TCG TPM Specification 1.2 revision 94. www.trustedcomputing.org, 2006.
    • (2006) TCG TPM Specification 1.2
  • 6
    • 36249024710 scopus 로고    scopus 로고
    • A double-edged blade - on trusted computing's impact on privacy
    • M. Hansen. A double-edged blade - on trusted computing's impact on privacy. In Datenschutz und Datensicherheit, pages 525-528, 2004.
    • (2004) Datenschutz und Datensicherheit , pp. 525-528
    • Hansen, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.