-
3
-
-
54249108575
-
On a possible privacy flaw in direct anonymous attestation (DAA)
-
Adrian Leung, Liqun Chen, Chris J. Mitchell. On a Possible Privacy Flaw in Direct Anonymous Attestation (DAA). TRUST 2008:179-190.
-
(2008)
TRUST
, pp. 179-190
-
-
Leung, A.1
Chen, L.2
Mitchell, C.J.3
-
4
-
-
52149103884
-
A new direct anonymous attestation scheme from bi-linear maps
-
Ernie Brickell, Liqun Chen, Jiangtao Li. A New Direct Anonymous Attestation Scheme from Bi-linear Maps. TRUST 2008: 166-178.
-
(2008)
TRUST
, pp. 166-178
-
-
Brickell, E.1
Chen, L.2
Li, J.3
-
6
-
-
85084162270
-
Design and implementation of a TCG-based integrity measurement architecture
-
San Diego, California, August
-
Reiner Sailer, Xiaolan Zhang, Trent Jaeger, Leendert van Doorn. Design and Implementation of a TCG-based Integrity Measurement Architecture. 13th Usenix Security Symposium, San Diego, California, August, 2004.
-
(2004)
13th Usenix Security Symposium
-
-
Sailer, R.1
Zhang, X.2
Jaeger, T.3
Van Doorn, L.4
-
7
-
-
29244450159
-
Property-based attestation for computing platforms: Caring about prop-erties, not mechanisms[C]
-
Nova Scotia, Canada, ACM Press: 67-77, September
-
A. Sadeghi, C. Stüble, Property-based Attestation for Computing Platforms: Caring about prop-erties, not mechanisms[C], New Security Paradigms Workshop, Nova Scotia, Canada, ACM Press: 67-77, September 2004.
-
(2004)
New Security Paradigms Workshop
-
-
Sadeghi, A.1
Stüble, C.2
-
8
-
-
24644439462
-
Els van herreweghen, michael waidner, property attestation - Scalable and privacy-friendly security assessment of peer computers[R]
-
October 5
-
Jonathan Poritz, Matthias Schunter, Els Van Herreweghen, Michael Waidner, Property Attestation - Scalable and Privacy-friendly Security Assessment of Peer Computers[R], IBM Research Technical Report RZ 3548, October 5, 2004.
-
(2004)
IBM Research Technical Report RZ 3548
-
-
Poritz, J.1
Schunter, M.2
-
9
-
-
34547196300
-
A protocol for property-based attetation[C]
-
Nova Scotia Canada, ACM Press: 7-16
-
Liqun Chen, Rainer Landfermann, Hans Löhr, et al. A protocol for property-based attetation[C]. In Proceedings of the first ACM workshop on Scalable trusted computing, Nova Scotia Canada, ACM Press: 7-16, 2006.
-
(2006)
Proceedings of the First ACM Workshop on Scalable Trusted Computing
-
-
Chen, L.1
Landfermann, R.2
Löhr, H.3
-
10
-
-
70749093631
-
Property-Based attestation without a trusted third party
-
Taipei, Taiwan, September 15-18
-
Liqun Chen, Hans Löhr, Mark Manulis, Ahmad-Reza Sadeghi. Property-Based Attestation without a Trusted Third Party. In Proceedings of the 11th international Conference on information Security. Taipei, Taiwan, September 15-18, 2008.
-
(2008)
Proceedings of the 11th International Conference on Information Security
-
-
Chen, L.1
Löhr, H.2
Manulis, M.3
Sadeghi, A.-R.4
-
11
-
-
84874324906
-
Identity-based encryption from the weil pairing
-
Kilian, J. (ed.) Springer, Heidelberg
-
Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213-229. Springer, Heidelberg (2001).
-
(2001)
CRYPTO 2001. LNCS
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
12
-
-
35048845114
-
Signature schemes and anonymous credentials from bilinear maps
-
Franklin, M. (ed.) Springer, Heidelberg
-
Camenisch, J., Lysyanskaya, A.. Signature schemes and anonymous credentials from bilinear maps. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp.56-72. Springer, Heidelberg (2004).
-
(2004)
CRYPTO 2004. LNCS
, vol.3152
, pp. 56-72
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
13
-
-
84982943258
-
Non-interactive and information-theoretic secure verifiable secret sharing
-
J. Feigenbaum, editor, International Association for Cryptologic Research, Springer-Verlag, Berlin Germany
-
T. P. Pedersen. Non-interactive and information-theoretic secure verifiable secret sharing. In J. Feigenbaum, editor, Advances in Cryptology - CRYPTO '91, volume 576 of LNCS, pages 129-140. International Association for Cryptologic Research, Springer-Verlag, Berlin Germany, 1992.
-
(1992)
Advances in Cryptology - CRYPTO '91, Volume 576 of LNCS
, pp. 129-140
-
-
Pedersen, T.P.1
-
14
-
-
0002882557
-
Efficient group signature schemes for large groups
-
Springer, Heidelberg
-
J. Camenisch, M. Stadler. Efficient group signature schemes for large groups. In: CAIP 1997. LNCS, vol. 1296, pp. 410-424. Springer, Heidelberg (1997).
-
(1997)
CAIP 1997. LNCS
, vol.1296
, pp. 410-424
-
-
Camenisch, J.1
Stadler, M.2
-
15
-
-
33745142417
-
Sequences of games: A tool for taming complexity in security proofs
-
V. Shoup. Sequences of Games: A Tool for Taming Complexity in Security Proofs. Cryptology ePrint report 2004/332, 2004.
-
(2004)
Cryptology ePrint Report 2004/332
-
-
Shoup, V.1
-
19
-
-
26444562547
-
New explicit conditions of elliptic curve traces for FRreduction
-
Atsuko Miyaji, Masaki Nakabayashi, Shunzou Takano. New explicit conditions of elliptic curve traces for FRreduction. IEICE Trans. E85-A(2), pp. 481-484, 2002.
-
(2002)
IEICE Trans. E85-A(2)
, pp. 481-484
-
-
Miyaji, A.1
Nakabayashi, M.2
Takano, S.3
|