-
1
-
-
70349245595
-
An efficient implementation of trusted channels based on OpenSSL
-
ACM Press
-
F. Armknecht, Y., Gasmi, Sadeghi, A., Stewin, P., Unger, M., An efficient implementation of trusted channels based on OpenSSL. Proc. of 3rd ACM workshop on Scalable Trusted Computing, pp. 41-50, ACM Press, 2008.
-
(2008)
Proc. of 3rd ACM Workshop on Scalable Trusted Computing
, pp. 41-50
-
-
Armknecht, F.1
Gasmi, Y.2
Sadeghi, A.3
Stewin, P.4
Unger, M.5
-
2
-
-
0026850091
-
Encrypted key exchange: Passwordbased protocols secure against dictionary attacks
-
IEEE Press
-
S.M. Bellovin, M. Merrit, Encrypted key exchange: passwordbased protocols secure against dictionary attacks. 1992 IEEE Symposium on Security & Privacy, pp.72-84, IEEE Press.
-
(1992)
IEEE Symposium on Security & Privacy
, pp. 72-84
-
-
Bellovin, S.M.1
Merrit, M.2
-
3
-
-
14844295011
-
Direct anonymous attestation
-
ACM Press
-
E. Brickell, J. Camenisch, L. Chen, Direct anonymous attestation. Proc. of 11th ACM conference on Computer and Communications Security, pp.132-145, ACM Press, 2004.
-
(2004)
Proc. of 11th ACM Conference on Computer and Communications Security
, pp. 132-145
-
-
Brickell, E.1
Camenisch, J.2
Chen, L.3
-
4
-
-
79952612270
-
Beyond secure channels
-
ACM Press
-
Y. Gasmi, A.R. Sadeghi, P. Stewin, M. Unger, N. Asokan, Beyond secure channels. Proc. of 2007 ACM Workshop on Scalable Trusted Computing, pp.30-40, ACM Press, 2007.
-
(2007)
Proc. of 2007 ACM Workshop on Scalable Trusted Computing
, pp. 30-40
-
-
Gasmi, Y.1
Sadeghi, A.R.2
Stewin, P.3
Unger, M.4
Asokan, N.5
-
5
-
-
34547205548
-
Linking remote attestation to secure tunnel endpoints
-
ACM Press
-
K. Goldman, R. Perez, R. Sailer, Linking remote attestation to secure tunnel endpoints. Proc. of 1st ACM Workshop on Scalable Trusted Computing, pp. 21-24, ACM Press, 2006.
-
(2006)
Proc. of 1st ACM Workshop on Scalable Trusted Computing
, pp. 21-24
-
-
Goldman, K.1
Perez, R.2
Sailer, R.3
-
6
-
-
2342505463
-
Securing Web servers against insider attack
-
IEEE Press
-
S. Jiang, S. Smith, K. Minami, Securing Web servers against insider attack. Proc. of 17th Annual Computer Security Applications Conference, pp. 265-276, IEEE Press, 2001.
-
(2001)
Proc. of 17th Annual Computer Security Applications Conference
, pp. 265-276
-
-
Jiang, S.1
Smith, S.2
Minami, K.3
-
7
-
-
0013225845
-
On the security of the SPEKE passwordauthenticated key exchange protocol
-
P. MacKenzie, On the security of the SPEKE passwordauthenticated key exchange protocol, Cryptology ePrint Archive, Report 2001/057, 2001.
-
(2001)
Cryptology EPrint Archive, Report 2001/057
-
-
MacKenzie, P.1
-
8
-
-
38149014725
-
Enabling fairer digital rights management with trusted computing
-
Proc.of ISC'07, Springer
-
A.R. Sadeghi, C. Stüble, M. Wolf, N. Asokan, J.E. Ekberg, Enabling fairer digital rights management with trusted computing. Proc.of ISC'07, LNCS 4779, pp.53-70, Springer 2007.
-
(2007)
LNCS
, vol.4779
, pp. 53-70
-
-
Sadeghi, A.R.1
Stüble, C.2
Wolf, M.3
Asokan, N.4
Ekberg, J.E.5
-
9
-
-
79953218276
-
A robust integrity reporting protocol for remote attestation
-
F. Stumpf, O. Tafreschi, P. Röder, C. Eckert, A robust integrity reporting protocol for remote attestation. In 2nd Workshop on Advances in Trusted Computing, WATC'06, 2006.
-
(2006)
2nd Workshop on Advances in Trusted Computing, WATC'06
-
-
Stumpf, F.1
Tafreschi, O.2
Röder, P.3
Eckert, C.4
-
10
-
-
77953978688
-
Using the secure remote password (SRP) protocol for TLS authentication
-
D.Taylor, T.Wu, T.Perrin, Using the secure remote password (SRP) protocol for TLS authentication. IETF RFC 5054.
-
IETF RFC 5054
-
-
Taylor, D.1
Wu, T.2
Perrin, T.3
-
12
-
-
70749106620
-
-
version 1.2 (parts 1-3).
-
Trusted Computing Group. TPM specification version 1.2 (parts 1-3). http://www.trustedcomputinggroup.org/specs/tpm/
-
TPM Specification
-
-
-
14
-
-
58549121204
-
A new anonymous password-based authenticated key exchange protocol
-
INDOCRYPT 2008, Springer
-
J. Yang, Z.F. Zhang, A new anonymous password-based authenticated key exchange protocol. INDOCRYPT 2008, LNCS, vol.5365, pp. 200-212, Springer, 2008.
-
(2008)
LNCS
, vol.5365
, pp. 200-212
-
-
Yang, J.1
Zhang, Z.F.2
|