-
1
-
-
77952321971
-
TPM Main Part 1
-
Trusted Computing Group, Version 1.2 Revision 62[EB/OL]. [2003-10-2]
-
Trusted Computing Group. TPM Main Part 1, Design Principles Specification, Version 1. 2 Revision 62[EB/OL]. [2003-10-2]. https://www. trustedcomputinggroup. org/home.
-
Design Principles Specification
-
-
-
2
-
-
33846308692
-
-
Trusted Computing Group, Version 1.10[EB/OL]. [2003-8-20]
-
Trusted Computing Group. TCG Software Stack (TSS) Specification, Version 1. 10[EB/OL]. [2003-8-20]. https://www. trusted-computinggroup. org.
-
TCG Software Stack (TSS) Specification
-
-
-
3
-
-
77649300895
-
-
Trusted Computing Group, Revision 0.1[EB/OL]. [2004-7-22]
-
Trusted Computing Group. TCG Glossary Specification, Revision 0. 1[EB/OL]. [2004-7-22]. https://www. trustedcomputinggroup. org/home.
-
TCG Glossary Specification
-
-
-
4
-
-
85084162270
-
Design and implementation of a TCG-based integrity measurement architecture
-
San Diego: USENIX Association
-
Sailer R, Zhang X L, Jaeger T, et al. Design and implementation of a TCG-based integrity measurement architecture. In: 13th Usenix Security Symposium. San Diego: USENIX Association, 2004. 16-16.
-
(2004)
13th Usenix Security Symposium
, pp. 16-16
-
-
Sailer, R.1
Zhang, X.L.2
Jaeger, T.3
-
8
-
-
33749064387
-
WS-Attestation: Efficient and fine-grained remote attestation on web services
-
Washington, DC: IEEE
-
Yoshihama S, Ebringer T, Nakamura M, et al. WS-Attestation: Efficient and fine-grained remote attestation on web services. In: Proceedings of International Conference on Web Services. Washington, DC: IEEE, 2005. 743-750.
-
(2005)
Proceedings of International Conference on Web Services
, pp. 743-750
-
-
Yoshihama, S.1
Ebringer, T.2
Nakamura, M.3
-
9
-
-
29244450159
-
Property-based attestation for computing platforms: Caring about properties, not mechanisms
-
Nova Scotia: ACM Press
-
Sadeghi A, Stüble C. Property-based attestation for computing platforms: caring about properties, not mechanisms. In: Proceedings of the 2004 Workshop on New Security Paradigms. Nova Scotia: ACM Press, 2004. 67-77.
-
(2004)
Proceedings of the 2004 Workshop on New Security Paradigms
, pp. 67-77
-
-
Sadeghi, A.1
Stüble, C.2
-
10
-
-
24644439462
-
Property attestation-scalable and privacy-friendly security assessment of peer computers
-
Poritz J, Schunter M, Herreweghen E V, et al. Property attestation-scalable and privacy-friendly security assessment of peer computers. IBM Research Report RZ 3548. 2004.
-
(2004)
IBM Research Report RZ 3548
-
-
Poritz, J.1
Schunter, M.2
Herreweghen, E.V.3
-
12
-
-
56649123241
-
Property-based attestation without a trusted third party
-
LNCS, Berlin: Springer-Verlag
-
Chen L Q, Löhr H, Manulis M, et al. Property-based attestation without a trusted third party. In: Proceedings of the 11th International Conference on Information Security. LNCS, vol. 5222. Berlin: Springer-Verlag, 2008. 31-46.
-
(2008)
Proceedings of the 11th International Conference on Information Security
, pp. 31-46
-
-
Chen, L.Q.1
Löhr, H.2
Manulis, M.3
-
15
-
-
84958612917
-
Efficient group signature schemes for large groups
-
LNCS, Heidelberg: Springer
-
Camenisch J, Stadler M. Efficient group signature schemes for large groups. In: CAIP 1997. LNCS, vol. 1296. Heidelberg: Springer, 1997. 410-424.
-
(1997)
CAIP 1997
, pp. 410-424
-
-
Camenisch, J.1
Stadler, M.2
-
16
-
-
84874324906
-
Identity-based encryption from the Weil pairing
-
LNCS, J. Kilian (Ed.), Heidelberg: Springer
-
Boneh D, Franklin M. Identity-based encryption from the Weil pairing. In: Kilian J, ed. CRYPTO 2001. LNCS, vol. 2139. Heidelberg: Springer, 2001. 213-229.
-
(2001)
CRYPTO 2001
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
17
-
-
35048845114
-
Signature schemes and anonymous credentials from bilinear maps
-
LNCS, M. Franklin (Ed.), Heidelberg: Springer
-
Camenisch J, Lysyanskaya A. Signature schemes and anonymous credentials from bilinear maps. In: Franklin M, ed. CRYPTO 2004. LNCS, vol. 3152. Heidelberg: Springer, 2004. 56-72.
-
(2004)
CRYPTO 2004
, vol.3152
, pp. 56-72
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
18
-
-
67651053584
-
Pseudonym systems
-
LNCS, H. M. Heys and C. M. Adams (Eds.), Heidelberg: Springer
-
Lysyanskaya A, Rivest R L, Sahai A, et al. Pseudonym systems. In: Heys H M, Adams C M, eds. SAC 1999. LNCS, vol. 1758. Heidelberg: Springer, 2000. 184-199.
-
(2000)
SAC 1999
, pp. 184-199
-
-
Lysyanskaya, A.1
Rivest, R.L.2
Sahai, A.3
-
19
-
-
84982943258
-
Non-interactive and information-theoretic secure verifiable secret sharing
-
LNCS, J. Feigenbaum (Ed.), Berlin: Springer-Verlag
-
Pedersen T P. Non-interactive and information-theoretic secure verifiable secret sharing. In: Feigenbaum J, ed. Advances in Cryptology-CRYPTO' 91, LNCS, vol. 576. Berlin: Springer-Verlag, 1992. 129-140.
-
(1992)
Advances in Cryptology-CRYPTO' 91
, pp. 129-140
-
-
Pedersen, T.P.1
-
20
-
-
84990731886
-
How to prove ourself: Practical solution to identification and signature problems
-
LNCS, London: Springer-Verlag
-
Fiat A, Shamir A. How to prove ourself: Practical solution to identification and signature problems. In: Advances in Cryptology-Crypto'86. LNCS 263. London: Springer-Verlag, 1987. 186-199.
-
(1987)
Advances in Cryptology-Crypto'86
, pp. 186-199
-
-
Fiat, A.1
Shamir, A.2
-
21
-
-
0027726717
-
Random oracles are practical: A paradigm for designing efficient protocols
-
New York: ACM Press
-
Bellare M, Rogaway P. Random oracles are practical: A paradigm for designing efficient protocols. In: Proceedings of the 1st CCS. New York: ACM Press, 1993. 62-73.
-
(1993)
Proceedings of the 1st CCS
, pp. 62-73
-
-
Bellare, M.1
Rogaway, P.2
-
24
-
-
26444562547
-
New explicit conditions of elliptic curve traces for FRreduction
-
Miyaji A, Nakabayashi M, Takano S. New explicit conditions of elliptic curve traces for FRreduction. IEICE Trans, 2002, E85-A: 481-484.
-
(2002)
IEICE Trans
, vol.E85-A
, pp. 481-484
-
-
Miyaji, A.1
Nakabayashi, M.2
Takano, S.3
|