-
1
-
-
71849091813
-
Exploiting cryptography for privacy-enhanced access control: A result of the PRIME project
-
Ardagna, C., Camenisch, J., Kohlweiss, M., Leenes, R., Neven, G., Priem, B., Samarati, P., Sommer, D., Verdicchio, M.: Exploiting cryptography for privacy-enhanced access control: A result of the PRIME project. Journal of Computer Security 18, 123-160 (2010)
-
(2010)
Journal of Computer Security
, vol.18
, pp. 123-160
-
-
Ardagna, C.1
Camenisch, J.2
Kohlweiss, M.3
Leenes, R.4
Neven, G.5
Priem, B.6
Samarati, P.7
Sommer, D.8
Verdicchio, M.9
-
2
-
-
70349245595
-
An efficient implementation of Trusted Channels based on Openssl
-
ACM, New York
-
Armknecht, F., Gasmi, Y., Sadeghi, A.R., Stewin, P., Unger, M., Ramunno, G., Vernizzi, D.: An efficient implementation of Trusted Channels based on Openssl. In: Proceedings of the 3rd ACM Workshop on Scalable Trusted Computing (STC 2008), pp. 41-50. ACM, New York (2008)
-
(2008)
Proceedings of the 3rd ACM Workshop on Scalable Trusted Computing (STC 2008)
, pp. 41-50
-
-
Armknecht, F.1
Gasmi, Y.2
Sadeghi, A.R.3
Stewin, P.4
Unger, M.5
Ramunno, G.6
Vernizzi, D.7
-
3
-
-
85013594843
-
Securing peer-to-peer networks using Trusted Computing
-
IEEE Press, Los Alamitos
-
Balfe, S., Lakhani, A.D., Paterson, K.G.: Securing peer-to-peer networks using Trusted Computing. In: Trusted Computing, pp. 271-298. IEEE Press, Los Alamitos (2005)
-
(2005)
Trusted Computing
, pp. 271-298
-
-
Balfe, S.1
Lakhani, A.D.2
Paterson, K.G.3
-
4
-
-
84957360970
-
Collision-free accumulators and fail-stop signature schemes without trees
-
Fumy, W. (ed.) EUROCRYPT 1997. Springer, Heidelberg
-
Barić, N., Pfitzmann, B.: Collision-free accumulators and fail-stop signature schemes without trees. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 480-494. Springer, Heidelberg (1997)
-
(1997)
LNCS
, vol.1233
, pp. 480-494
-
-
Barić, N.1
Pfitzmann, B.2
-
5
-
-
77954699328
-
Cryptographic protocols of the identity mixer library
-
(#99740) IBM Research
-
Bichsel, P., Binding, C., Camenisch, J., Groß, T., Heydt-Benjamin, T., Sommer, D., Zaverucha, G.: Cryptographic protocols of the identity mixer library. Technical Report RZ 3730 (#99740), IBM Research (2009)
-
(2009)
Technical Report RZ
, vol.3730
-
-
Bichsel, P.1
Binding, C.2
Camenisch, J.3
Groß, T.4
Heydt-Benjamin, T.5
Sommer, D.6
Zaverucha, G.7
-
6
-
-
74049125197
-
Anonymous credentials on a standard Java Card
-
ACM Press, New York
-
Bichsel, P., Camenisch, J., Groß, T., Shoup, V.: Anonymous credentials on a standard Java Card. In: Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS 2009). ACM Press, New York (2009)
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS 2009)
-
-
Bichsel, P.1
Camenisch, J.2
Groß, T.3
Shoup, V.4
-
7
-
-
34447131375
-
-
RFC 4366 (Proposed Standard), Obsoleted by RFC 5246 April
-
Blake-Wilson, S., Nystrom, M., Hopwood, D., Mikkelsen, J., Wright, T.: Transport Layer Security (TLS) Extensions. RFC 4366 (Proposed Standard), Obsoleted by RFC 5246 (April 2006)
-
(2006)
Transport Layer Security (TLS) Extensions
-
-
Blake-Wilson, S.1
Nystrom, M.2
Hopwood, D.3
Mikkelsen, J.4
Wright, T.5
-
8
-
-
14844295011
-
Direct Anonymous Attestation
-
ACM Press, New York
-
Brickell, E., Camenisch, J., Chen, L.: Direct Anonymous Attestation. In: Proceedings of the 11th ACM Conference on Computer and Communications Security (CCS 2004), pp. 132-145. ACM Press, New York (2004)
-
(2004)
Proceedings of the 11th ACM Conference on Computer and Communications Security (CCS 2004)
, pp. 132-145
-
-
Brickell, E.1
Camenisch, J.2
Chen, L.3
-
9
-
-
70349608477
-
Simplified security notions of Direct Anonymous Attestation and a concrete scheme from pairings
-
Brickell, E., Chen, L., Li, J.: Simplified security notions of Direct Anonymous Attestation and a concrete scheme from pairings. International Journal of Information Security 8(5), 315-330 (2009)
-
(2009)
International Journal of Information Security
, vol.8
, Issue.5
, pp. 315-330
-
-
Brickell, E.1
Chen, L.2
Li, J.3
-
10
-
-
84945135810
-
An efficient system for non-transferable anonymous credentials with optional anonymity revocation
-
Pfitzmann, B. (ed.) EUROCRYPT 2001. Springer, Heidelberg
-
Camenisch, J., Lysyanskaya, A.: An efficient system for non-transferable anonymous credentials with optional anonymity revocation. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 93-118. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2045
, pp. 93-118
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
11
-
-
35048845114
-
Signature schemes and anonymous credentials from bilinear maps
-
Franklin, M. (ed.) CRYPTO 2004. Springer, Heidelberg
-
Camenisch, J., Lysyanskaya, A.: Signature schemes and anonymous credentials from bilinear maps. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 56-72. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3152
, pp. 56-72
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
12
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
Chaum, D.: Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM 24(2), 84-88 (1981)
-
(1981)
Commun. ACM
, vol.24
, Issue.2
, pp. 84-88
-
-
Chaum, D.1
-
13
-
-
0022145479
-
Security without identification: Transaction systems to make big brother obsolete
-
Chaum, D.: Security without identification: Transaction systems to make big brother obsolete. ACM Commun. 28(10), 1030-1044 (1985)
-
(1985)
ACM Commun.
, vol.28
, Issue.10
, pp. 1030-1044
-
-
Chaum, D.1
-
15
-
-
52149086372
-
Pairings in Trusted Computing
-
Galbraith, S.D., Paterson, K.G. (eds.) Pairing 2008. Springer, Heidelberg
-
Chen, L., Morrissey, P., Smart, N.: Pairings in Trusted Computing. In: Galbraith, S.D., Paterson, K.G. (eds.) Pairing 2008. LNCS, vol. 5209, pp. 1-17. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5209
, pp. 1-17
-
-
Chen, L.1
Morrissey, P.2
Smart, N.3
-
17
-
-
57049104588
-
Universally composable security analysis of TLS
-
Baek, J., Bao, F., Chen, K., Lai, X. (eds.) ProvSec 2008. Springer, Heidelberg
-
Gajek, S., Manulis, M., Pereira, O., Sadeghi, A.R., Schwenk, J.: Universally composable security analysis of TLS. In: Baek, J., Bao, F., Chen, K., Lai, X. (eds.) ProvSec 2008. LNCS, vol. 5324, pp. 313-327. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5324
, pp. 313-327
-
-
Gajek, S.1
Manulis, M.2
Pereira, O.3
Sadeghi, A.R.4
Schwenk, J.5
-
18
-
-
34547205548
-
Linking remote attestation to secure tunnel end-points
-
ACM, New York
-
Goldman, K., Perez, R., Sailer, R.: Linking remote attestation to secure tunnel end-points. In: Proceedings of the first ACM workshop on Scalable Trusted Computing (STC 2006), pp. 21-24. ACM, New York (2006)
-
(2006)
Proceedings of the First ACM Workshop on Scalable Trusted Computing (STC 2006)
, pp. 21-24
-
-
Goldman, K.1
Perez, R.2
Sailer, R.3
-
19
-
-
0005063385
-
Onion routing
-
Goldschlag, D.M., Reed, M.G., Syverson, P.F.: Onion routing. ACM Commun. 42(2), 39-41 (1999)
-
(1999)
ACM Commun.
, vol.42
, Issue.2
, pp. 39-41
-
-
Goldschlag, D.M.1
Reed, M.G.2
Syverson, P.F.3
-
20
-
-
38149073252
-
Ninja: Non identity based, privacy preserving authentication for ubiquitous environments
-
Krumm, J., Abowd, G.D., Seneviratne, A., Strang, T. (eds.) UbiComp 2007. Springer, Heidelberg
-
Leung, A., Mitchell, C.J.: Ninja: Non identity based, privacy preserving authentication for ubiquitous environments. In: Krumm, J., Abowd, G.D., Seneviratne, A., Strang, T. (eds.) UbiComp 2007. LNCS, vol. 4717, pp. 73-90. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4717
, pp. 73-90
-
-
Leung, A.1
Mitchell, C.J.2
-
21
-
-
77954736866
-
-
Lindell, A.Y.: Anonymous authentication. Aladdin Knowledge Systems Inc. (2006), http://www.aladdin.com/blog/pdf/AnonymousAuthentication.pdf
-
(2006)
Anonymous Authentication
-
-
Lindell, A.Y.1
-
22
-
-
26444607972
-
Dynamic k-times anonymous authentication
-
Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. Springer, Heidelberg
-
Nguyen, L., Safavi-Naini, R.: Dynamic k-times anonymous authentication. In: Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. LNCS, vol. 3531, pp. 318-333. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3531
, pp. 318-333
-
-
Nguyen, L.1
Safavi-Naini, R.2
-
24
-
-
77954724655
-
Supergeek pulls off 'near impossible' crypto chip hack
-
February
-
Robertson, J.: Supergeek pulls off 'near impossible' crypto chip hack. News article at NZ Herald (February 2010), http://www.nzherald.co.nz/technology/ news/article.cfm?c-id=5&objectid=10625082&pnum=0
-
(2010)
News Article at NZ Herald
-
-
Robertson, J.1
-
26
-
-
84956867779
-
Anonymous authentication of membership in dynamic groups
-
Franklin, M.K. (ed.) FC 1999. Springer, Heidelberg
-
Schechter, S., Parnell, T., Hartemink, A.: Anonymous authentication of membership in dynamic groups. In: Franklin, M.K. (ed.) FC 1999. LNCS, vol. 1648, pp. 184-195. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1648
, pp. 184-195
-
-
Schechter, S.1
Parnell, T.2
Hartemink, A.3
-
27
-
-
38149070279
-
Direct Anonymous Attestation (DAA): Ensuring privacy with corrupt administrators
-
Stajano, F., Meadows, C., Capkun, S., Moore, T. (eds.) ESAS 2007. Springer, Heidelberg
-
Smyth, B., Ryan, M., Chen, L.: Direct Anonymous Attestation (DAA): Ensuring privacy with corrupt administrators. In: Stajano, F., Meadows, C., Capkun, S., Moore, T. (eds.) ESAS 2007. LNCS, vol. 4572, pp. 218-231. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4572
, pp. 218-231
-
-
Smyth, B.1
Ryan, M.2
Chen, L.3
-
28
-
-
84937565289
-
Towards an analysis of onion routing security
-
Federrath, H. (ed.) Designing Privacy Enhancing Technologies. Springer, Heidelberg
-
Syverson, P.F., Tsudik, G., Reed, M.G., Landwehr, C.E.: Towards an analysis of onion routing security. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol. 2009, pp. 96-114. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2009
, pp. 96-114
-
-
Syverson, P.F.1
Tsudik, G.2
Reed, M.G.3
Landwehr, C.E.4
-
29
-
-
77954730375
-
-
Trusted Computing Group: Version 1.2, Level 1, Errata A
-
Trusted Computing Group: TCG Software Stack Specification Version 1.2, Level 1, Errata A
-
TCG Software Stack Specification
-
-
-
30
-
-
77954408441
-
-
Trusted Computing Group: Version 1.2, Revision 103
-
Trusted Computing Group: TCG TPM Specification, Version 1.2, Revision 103
-
TCG TPM Specification
-
-
|