-
1
-
-
33750236737
-
Consumable credentials in logic-based access control
-
Technical Report CMU-CYLAB-06-002, CyLab, Carnegie Mellon University, Feb
-
L. Bauer, K. D. Bowers, F. Pfenning, and M. K. Reiter. Consumable credentials in logic-based access control. Technical Report CMU-CYLAB-06-002, CyLab, Carnegie Mellon University, Feb. 2006.
-
(2006)
-
-
Bauer, L.1
Bowers, K.D.2
Pfenning, F.3
Reiter, M.K.4
-
3
-
-
84957800809
-
KeyNote: Trust management for public-key infrastructures
-
position paper
-
M. Blaze, J. Feigenbaum, and A. D. Keromytis. KeyNote: Trust management for public-key infrastructures (position paper). In LNCS 1550, pages 59-63, 1999.
-
(1999)
LNCS
, vol.1550
, pp. 59-63
-
-
Blaze, M.1
Feigenbaum, J.2
Keromytis, A.D.3
-
6
-
-
34547379480
-
How to win the Clonewars: Efficient Periodic n-times anonymous authentication
-
New York, NY, USA, ACM Press
-
J. Camenisch, S. Hohenberger, M. Kohlweiss, A. Lysyanskaya, and M. Meyerovich. How to win the Clonewars: Efficient Periodic n-times anonymous authentication. In CCS '06: Proceedings of the 13th ACM conference on Computer and communications security, pages 201-210, New York, NY, USA, 2006. ACM Press.
-
(2006)
CCS '06: Proceedings of the 13th ACM conference on Computer and communications security
, pp. 201-210
-
-
Camenisch, J.1
Hohenberger, S.2
Kohlweiss, M.3
Lysyanskaya, A.4
Meyerovich, M.5
-
7
-
-
0001604533
-
Blind Signatures for Untraceable Payments
-
Plenum Press
-
D. Chaum. Blind Signatures for Untraceable Payments. In Advances in Cryptology - Crypto '82 Proceedings, pages 199-203. Plenum Press. 1982.
-
(1982)
Advances in Cryptology - Crypto '82 Proceedings
, pp. 199-203
-
-
Chaum, D.1
-
8
-
-
0035680371
-
Certificate chain discovery in SPKI/SDSI
-
D. Clarke, J.-E. Elien, C. Ellison, M. Fredette, A. Morcos, and R. L. Rivest. Certificate chain discovery in SPKI/SDSI. Journal of Computer Science, 9(4):285-322, 2001.
-
(2001)
Journal of Computer Science
, vol.9
, Issue.4
, pp. 285-322
-
-
Clarke, D.1
Elien, J.-E.2
Ellison, C.3
Fredette, M.4
Morcos, A.5
Rivest, R.L.6
-
12
-
-
26444607972
-
Dynamic k-times anonymous authentication
-
Applied Cryptography and Network Security ACNS 2005, of
-
L. Nguyen and R. Safavi-Naini. Dynamic k-times anonymous authentication. In Applied Cryptography and Network Security (ACNS 2005), volume 3531 of Lecture Notes in Computer Science, pages 318-333, 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3531
, pp. 318-333
-
-
Nguyen, L.1
Safavi-Naini, R.2
-
13
-
-
85013587012
-
An overview of NGSCB
-
C. Mitchell, editor, chapter 4. IEE
-
M. Peinado, P. England, and Y. Chen. An overview of NGSCB. In C. Mitchell, editor, Trusted Computing, chapter 4. IEE, 2005.
-
(2005)
Trusted Computing
-
-
Peinado, M.1
England, P.2
Chen, Y.3
-
15
-
-
56749125876
-
-
L. F. G. Sarmenta and contributors. TPM/J: Java-based API for the Trusted Platform Module (TPM). http://projects.csail.mit.edu/tc/tpmj/, Dec. 2006.
-
L. F. G. Sarmenta and contributors. TPM/J: Java-based API for the Trusted Platform Module (TPM). http://projects.csail.mit.edu/tc/tpmj/, Dec. 2006.
-
-
-
-
16
-
-
34547182340
-
Virtual Monotonic Counters and Count-Limited Objects using a TPM without a Trusted OS
-
Nov
-
L. F. G. Sarmenta, M. van Dijk, C. W. O'Donnell, J. Rhodes, and S. Devadas. Virtual Monotonic Counters and Count-Limited Objects using a TPM without a Trusted OS. In Proceedings of the 1st ACM CCS Workshop on Scalable Trusted Computing (STC'06), Nov. 2006.
-
(2006)
Proceedings of the 1st ACM CCS Workshop on Scalable Trusted Computing (STC'06)
-
-
Sarmenta, L.F.G.1
van Dijk, M.2
O'Donnell, C.W.3
Rhodes, J.4
Devadas, S.5
-
18
-
-
35048839792
-
J. Furukawa, and K. Sako. k-times anonymous authentication (extended abstract)
-
ASIACRYPT 2004, of
-
I. Teranishi, J. Furukawa, and K. Sako. k-times anonymous authentication (extended abstract). In ASIACRYPT 2004, volume 3329 of Lecture Notes in Computer Science, pages 308-322, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.3329
, pp. 308-322
-
-
Teranishi, I.1
-
19
-
-
34250204324
-
-
Trusted Computing Group
-
Trusted Computing Group. Mobile Phone Specifications. https://www.trustedcomputinggroup.org/specs/mobilephone/.
-
Mobile Phone Specifications
-
-
-
20
-
-
77954408441
-
-
Trusted Computing Group, version 1.2
-
Trusted Computing Group. TCG TPM Specification version 1.2. https://www.trustedcomputinggroup.org/specs/TPM/.
-
TCG TPM Specification
-
-
|