메뉴 건너뛰기




Volumn , Issue , 2008, Pages 2145-2152

Offline count-limited certificates

Author keywords

Authentication; Offline payments; Smartcards; Trusted Platform Module (TPM)

Indexed keywords

DIGITAL CERTIFICATES; EXPERIMENTAL PERFORMANCES; HARDWARE DEVICES; HARDWARE FUNCTIONALITIES; HOST SYSTEMS; OFFLINE; OFFLINE PAYMENTS; TIMESTAMPING; TRUSTED COMPUTING BASE; TRUSTED PLATFORM MODULE (TPM);

EID: 56749177789     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1363686.1364200     Document Type: Conference Paper
Times cited : (4)

References (20)
  • 1
    • 33750236737 scopus 로고    scopus 로고
    • Consumable credentials in logic-based access control
    • Technical Report CMU-CYLAB-06-002, CyLab, Carnegie Mellon University, Feb
    • L. Bauer, K. D. Bowers, F. Pfenning, and M. K. Reiter. Consumable credentials in logic-based access control. Technical Report CMU-CYLAB-06-002, CyLab, Carnegie Mellon University, Feb. 2006.
    • (2006)
    • Bauer, L.1    Bowers, K.D.2    Pfenning, F.3    Reiter, M.K.4
  • 3
    • 84957800809 scopus 로고    scopus 로고
    • KeyNote: Trust management for public-key infrastructures
    • position paper
    • M. Blaze, J. Feigenbaum, and A. D. Keromytis. KeyNote: Trust management for public-key infrastructures (position paper). In LNCS 1550, pages 59-63, 1999.
    • (1999) LNCS , vol.1550 , pp. 59-63
    • Blaze, M.1    Feigenbaum, J.2    Keromytis, A.D.3
  • 12
    • 26444607972 scopus 로고    scopus 로고
    • Dynamic k-times anonymous authentication
    • Applied Cryptography and Network Security ACNS 2005, of
    • L. Nguyen and R. Safavi-Naini. Dynamic k-times anonymous authentication. In Applied Cryptography and Network Security (ACNS 2005), volume 3531 of Lecture Notes in Computer Science, pages 318-333, 2005.
    • (2005) Lecture Notes in Computer Science , vol.3531 , pp. 318-333
    • Nguyen, L.1    Safavi-Naini, R.2
  • 13
    • 85013587012 scopus 로고    scopus 로고
    • An overview of NGSCB
    • C. Mitchell, editor, chapter 4. IEE
    • M. Peinado, P. England, and Y. Chen. An overview of NGSCB. In C. Mitchell, editor, Trusted Computing, chapter 4. IEE, 2005.
    • (2005) Trusted Computing
    • Peinado, M.1    England, P.2    Chen, Y.3
  • 15
    • 56749125876 scopus 로고    scopus 로고
    • L. F. G. Sarmenta and contributors. TPM/J: Java-based API for the Trusted Platform Module (TPM). http://projects.csail.mit.edu/tc/tpmj/, Dec. 2006.
    • L. F. G. Sarmenta and contributors. TPM/J: Java-based API for the Trusted Platform Module (TPM). http://projects.csail.mit.edu/tc/tpmj/, Dec. 2006.
  • 18
    • 35048839792 scopus 로고    scopus 로고
    • J. Furukawa, and K. Sako. k-times anonymous authentication (extended abstract)
    • ASIACRYPT 2004, of
    • I. Teranishi, J. Furukawa, and K. Sako. k-times anonymous authentication (extended abstract). In ASIACRYPT 2004, volume 3329 of Lecture Notes in Computer Science, pages 308-322, 2004.
    • (2004) Lecture Notes in Computer Science , vol.3329 , pp. 308-322
    • Teranishi, I.1
  • 19
    • 34250204324 scopus 로고    scopus 로고
    • Trusted Computing Group
    • Trusted Computing Group. Mobile Phone Specifications. https://www.trustedcomputinggroup.org/specs/mobilephone/.
    • Mobile Phone Specifications
  • 20
    • 77954408441 scopus 로고    scopus 로고
    • Trusted Computing Group, version 1.2
    • Trusted Computing Group. TCG TPM Specification version 1.2. https://www.trustedcomputinggroup.org/specs/TPM/.
    • TCG TPM Specification


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.