-
1
-
-
57049105232
-
Zero Knowledge in the Applied Pi-Calculus and Automated Verification of the Direct Anonymous Attestation Protocol. Cryptology ePrint Archive
-
Report 2007/289
-
Backes, M., Maffei, M., Unruh, D.: Zero Knowledge in the Applied Pi-Calculus and Automated Verification of the Direct Anonymous Attestation Protocol. Cryptology ePrint Archive. Report 2007/289 (2007), http://eprint.iacr.org/2007/289
-
(2007)
-
-
Backes, M.1
Maffei, M.2
Unruh, D.3
-
2
-
-
85013594843
-
-
Balfe, S., Lakhani, A.D., Paterson, K.G.: Securing Peer-to-Peer Networks using Trusted Computing. In: Mitchell, C. (ed.) Trusted Computing, ch. 10, pp. 271-298. IEEE Computer Society Press, Los Alamitos (2005)
-
Balfe, S., Lakhani, A.D., Paterson, K.G.: Securing Peer-to-Peer Networks using Trusted Computing. In: Mitchell, C. (ed.) Trusted Computing, ch. 10, pp. 271-298. IEEE Computer Society Press, Los Alamitos (2005)
-
-
-
-
3
-
-
14844295011
-
Direct Anonymous Attestation
-
ACM Press, New York
-
Brickell, E., Camenisch, J., Chen, L.: Direct Anonymous Attestation. In: Proceedings of the 11th ACM Conference on Computer and Communications Security, pp. 132-145. ACM Press, New York (2004)
-
(2004)
Proceedings of the 11th ACM Conference on Computer and Communications Security
, pp. 132-145
-
-
Brickell, E.1
Camenisch, J.2
Chen, L.3
-
4
-
-
84863941015
-
Simplified Security Notions for Direct Anonymous Attestation and a Concrete Scheme from Pairings. Cryptology ePrint Archive
-
Report 2008/104
-
Brickell, E., Chen, L., Li, J.: Simplified Security Notions for Direct Anonymous Attestation and a Concrete Scheme from Pairings. Cryptology ePrint Archive. Report 2008/104 (2008), http://eprint.iacr.org/2008/104
-
(2008)
-
-
Brickell, E.1
Chen, L.2
Li, J.3
-
5
-
-
52149103884
-
-
Brickell, E., Chen, L., Li, J.: A New Direct Anonymous Attestation Scheme from Bilinear Maps. In: Lipp, P., Sadeghi, A.-R., Koch, K.-M. (eds.) Trust 2008. LNCS, 4968, pp. 166-178. Springer, Heidelberg (2008)
-
Brickell, E., Chen, L., Li, J.: A New Direct Anonymous Attestation Scheme from Bilinear Maps. In: Lipp, P., Sadeghi, A.-R., Koch, K.-M. (eds.) Trust 2008. LNCS, vol. 4968, pp. 166-178. Springer, Heidelberg (2008)
-
-
-
-
6
-
-
23944501377
-
-
Camenisch, J., Groth, J.: Group Signatures: Better efficiency and new Theoretical Aspects. In: Blundo, C., Cimato, S. (eds.) SCN 2004. LNCS, 3352, pp. 122-135. Springer, Heidelberg (2005)
-
Camenisch, J., Groth, J.: Group Signatures: Better efficiency and new Theoretical Aspects. In: Blundo, C., Cimato, S. (eds.) SCN 2004. LNCS, vol. 3352, pp. 122-135. Springer, Heidelberg (2005)
-
-
-
-
7
-
-
35248839965
-
-
Camenisch, J., Lysyanskaya, A.: A Signature Scheme with Efficient Protocols. In: Cimato, S., Galdi, C., Persiano, G. (eds.) SCN 2002. LNCS, 2576, pp. 268-289. Springer, Heidelberg (2003)
-
Camenisch, J., Lysyanskaya, A.: A Signature Scheme with Efficient Protocols. In: Cimato, S., Galdi, C., Persiano, G. (eds.) SCN 2002. LNCS, vol. 2576, pp. 268-289. Springer, Heidelberg (2003)
-
-
-
-
8
-
-
35048845114
-
Signature Schemes and Anonymous Credentials from Bilinear Maps
-
Franklin, M, ed, CRYPTO 2004, Springer, Heidelberg
-
Camenisch, J., Lysyanskaya, A.: Signature Schemes and Anonymous Credentials from Bilinear Maps. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 56-72. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3152
, pp. 56-72
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
9
-
-
52149086372
-
-
Chen, L., Morrissey, P., Smart, N.P.: Pairings in Trusted Computing. In: Galbraith, S.D., Paterson, K.G. (eds.) Pairing 2008. LNCS, 5209, pp. 1-17. Springer, Heidelberg (2008)
-
Chen, L., Morrissey, P., Smart, N.P.: Pairings in Trusted Computing. In: Galbraith, S.D., Paterson, K.G. (eds.) Pairing 2008. LNCS, vol. 5209, pp. 1-17. Springer, Heidelberg (2008)
-
-
-
-
10
-
-
38049042811
-
-
Ge, H., Tate, S.R.: A Direct Anonymous Attestation Scheme for Embedded Devices. In: Okamoto, T., Wang, X. (eds.) PKC 2007. LNCS, 4450, Springer, Heidelberg (2007)
-
Ge, H., Tate, S.R.: A Direct Anonymous Attestation Scheme for Embedded Devices. In: Okamoto, T., Wang, X. (eds.) PKC 2007. LNCS, vol. 4450, Springer, Heidelberg (2007)
-
-
-
-
11
-
-
38149073252
-
-
Leung, A., Mitchell, C.J.: Ninja: Non-Identity Based, Privacy Preserving Authentication for Ubiquitous Environments. In: Krumm, J., Abowd, G.D., Seneviratne, A., Strang, T. (eds.) UbiComp 2007. LNCS, 4717, pp. 73-90. Springer, Heidelberg (2007)
-
Leung, A., Mitchell, C.J.: Ninja: Non-Identity Based, Privacy Preserving Authentication for Ubiquitous Environments. In: Krumm, J., Abowd, G.D., Seneviratne, A., Strang, T. (eds.) UbiComp 2007. LNCS, vol. 4717, pp. 73-90. Springer, Heidelberg (2007)
-
-
-
-
12
-
-
38149070279
-
-
Smyth, B., Chen, L., Ryan, M.: Direct Anonymous Attestation (DAA): Ensuring Privacy with Corrupt Administrators. In: Stajano, F., Meadows, C., Capkun, S., Moore, T. (eds.) ESAS 2007. LNCS, 4572, pp. 218-231. Springer, Heidelberg (2007)
-
Smyth, B., Chen, L., Ryan, M.: Direct Anonymous Attestation (DAA): Ensuring Privacy with Corrupt Administrators. In: Stajano, F., Meadows, C., Capkun, S., Moore, T. (eds.) ESAS 2007. LNCS, vol. 4572, pp. 218-231. Springer, Heidelberg (2007)
-
-
-
|