-
1
-
-
24944516264
-
Tag-KEM/DEM: A New Framework for Hybrid Encryption and A New Analysis of Kurosawa-Desmedt KEM
-
Cramer, R.J.F, ed, EURO CRYPT 2005, Springer, Heidelberg
-
Abe, M., Gennaro, R., Kurosawa, K., Shoup, V.: Tag-KEM/DEM: A New Framework for Hybrid Encryption and A New Analysis of Kurosawa-Desmedt KEM. In: Cramer, R.J.F. (ed.) EURO CRYPT 2005. LNCS, vol. 3494, pp. 128-146. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3494
, pp. 128-146
-
-
Abe, M.1
Gennaro, R.2
Kurosawa, K.3
Shoup, V.4
-
2
-
-
0034828870
-
Cryptographic security for mobile code
-
Algesheimer, J., Cachin, C., Camenisch, J., Karjoth, G.: Cryptographic security for mobile code. In: Proc. of the IEEE Symposium on Security and Privacy, pp. 2-11 (2001)
-
(2001)
Proc. of the IEEE Symposium on Security and Privacy
, pp. 2-11
-
-
Algesheimer, J.1
Cachin, C.2
Camenisch, J.3
Karjoth, G.4
-
3
-
-
85032877753
-
Non-interactive oblivious transfer and applications
-
Brassard, G, ed, CRYPTO 1989, Springer, Heidelberg
-
Bellare, M., Micali, S.: Non-interactive oblivious transfer and applications. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 547-557. Springer, Heidelberg (1990)
-
(1990)
LNCS
, vol.435
, pp. 547-557
-
-
Bellare, M.1
Micali, S.2
-
4
-
-
1842616017
-
Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack
-
Cramer, R., Shoup, V.: Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack. SIAM J. Comput. 33(1), 167-226 (2003)
-
(2003)
SIAM J. Comput
, vol.33
, Issue.1
, pp. 167-226
-
-
Cramer, R.1
Shoup, V.2
-
5
-
-
34247232660
-
-
Gunupudi, V., Tate, S.R.: SAgent: A Security Framework for JADE. In: AAMAS 2006: Proceedings of the fifth international joint conference on Autonomous agents and multiagent systems, pp. 1116-1118 (2006)
-
Gunupudi, V., Tate, S.R.: SAgent: A Security Framework for JADE. In: AAMAS 2006: Proceedings of the fifth international joint conference on Autonomous agents and multiagent systems, pp. 1116-1118 (2006)
-
-
-
-
6
-
-
38049124670
-
Experimental evaluation of security protocols in SAgent
-
Gunupudi, V., Tate, S.R., Xu, K.: Experimental evaluation of security protocols in SAgent. In: Proceedings of the International Workshop on Privacy and Security in Agent-based Collaborative Environments (PSACE), pp. 60-74 (2006)
-
(2006)
Proceedings of the International Workshop on Privacy and Security in Agent-based Collaborative Environments (PSACE)
, pp. 60-74
-
-
Gunupudi, V.1
Tate, S.R.2
Xu, K.3
-
7
-
-
0003462641
-
How to exchange secrets by oblivious transfer
-
Tech. Rep. TR-81, Harvard University
-
Rabin, M.O.: How to exchange secrets by oblivious transfer. Tech. Rep. TR-81, Harvard University (1981)
-
(1981)
-
-
Rabin, M.O.1
-
8
-
-
34547182340
-
Virtual monotonic counters and count-limited objects using a TPM without a trusted OS
-
Sarmenta, L.F.G., Van Dijk, M., O'Donnell, C.W., Rhodes, J., Devadas, S.: Virtual monotonic counters and count-limited objects using a TPM without a trusted OS. In: STC 2006: Proceedings of the First ACM Workshop on Scalable Trusted Computing, pp. 27-42 (2006)
-
(2006)
STC 2006: Proceedings of the First ACM Workshop on Scalable Trusted Computing
, pp. 27-42
-
-
Sarmenta, L.F.G.1
Van Dijk, M.2
O'Donnell, C.W.3
Rhodes, J.4
Devadas, S.5
-
10
-
-
50949106225
-
-
Master's thesis, Eidgenossische Technische Hochschule ETH, Zurich, Project web page
-
Strasser, M., Sevnic, P.E.: A software-based TPM emulator for Linux. Master's thesis, Eidgenossische Technische Hochschule (ETH), Zurich, Project web page (2005), http://developer.berlios.de/projects/tpm-emulator/
-
(2005)
A software-based TPM emulator for Linux
-
-
Strasser, M.1
Sevnic, P.E.2
-
12
-
-
54249170266
-
-
Trusted Computing Group
-
Trusted Computing Group, http://www.trustedcomputinggroup.org
-
-
-
-
13
-
-
54249098837
-
-
Trusted Computing Group. TPM main specification, version 1.2, revision 103, parts 1-3 (2007), http://www.trustedcomputinggroup.org
-
Trusted Computing Group. TPM main specification, version 1.2, revision 103, parts 1-3 (2007), http://www.trustedcomputinggroup.org
-
-
-
-
14
-
-
35048823067
-
-
Xu, K., Tate, S.R.: Universally composable secure mobile agent computation. In: Zhang, K., Zheng, Y. (eds.) ISC 2004. LNCS, 3225, pp. 304-317. Springer, Heidelberg (2004)
-
Xu, K., Tate, S.R.: Universally composable secure mobile agent computation. In: Zhang, K., Zheng, Y. (eds.) ISC 2004. LNCS, vol. 3225, pp. 304-317. Springer, Heidelberg (2004)
-
-
-
|