-
1
-
-
77953724060
-
TCG specification architecture overview
-
Trusted Computing Group
-
Trusted Computing Group. TCG Specification Architecture Overview v1.2, 2004.
-
(2004)
, vol.2
-
-
-
2
-
-
54749099876
-
Functionality and interface specification of cryptographic support platform for trusted computing
-
State Cryptography Administration, in Chinese
-
State Cryptography Administration. Functionality and Interface Specification of Cryptographic Support Platform for Trusted Computing. 2007(in Chinese).
-
(2007)
-
-
-
4
-
-
38049042811
-
A direct anonymous attestation scheme for embedded devices
-
Okamoto Tatsuaki, Wang Xiaoyun, Berlin: Springer
-
Ge He, Tate Stephen R. A direct anonymous attestation scheme for embedded devices//Okamoto Tatsuaki, Wang Xiaoyun. Public Key Cryptography. Berlin: Springer, 2007: 16-30.
-
(2007)
Public Key Cryptography
, pp. 16-30
-
-
Ge, H.1
Tate Stephen, R.2
-
5
-
-
56649119348
-
Enhanced privacy ID: A direct anonymous attestation scheme with enhanced revocation capabilities
-
Alexandria, Virginia, USA
-
Brickell Ernie, Li Jiang-Tao. Enhanced privacy ID: A direct anonymous attestation scheme with enhanced revocation capabilities//Proceedings of the 2007 ACM Workshop on Pri-vacy in Electronic Society. Alexandria, Virginia, USA, 2007: 21-30.
-
(2007)
Proceedings of the 2007 ACM Workshop on Pri-vacy in Electronic Society
, pp. 21-30
-
-
Ernie, B.1
Li, J.-T.2
-
6
-
-
52149103884
-
A new direct anonymous attestation scheme from Bilinear Maps
-
Lipp Peter, Sadeghi Ahmad-Reza, Koch Klaus-Michael, Berlin: Springer
-
Brickell Ernie, Chen Li-Qun, Li Jiang-Tao. A new direct anonymous attestation scheme from Bilinear Maps//Lipp Peter, Sadeghi Ahmad-Reza, Koch Klaus-Michael. Trusted Computing-Challenges and Applications. Berlin: Springer, 2008: 166-178.
-
(2008)
Trusted Computing-Challenges and Applications
, pp. 166-178
-
-
Ernie, B.1
Chen, L.-Q.2
Li, J.-T.3
-
7
-
-
78149400598
-
Enhanced privacy ID from bilinear maps
-
Cryptology ePring Archive: 095
-
Brickell Ernie, Li Jiang-Tao. Enhanced privacy ID from bilinear maps. Cryptology ePring Archive: 095, 2009.
-
(2009)
-
-
Ernie, B.1
Li, J.-T.2
-
8
-
-
33749993205
-
Constant-size dynamic k-TAA
-
Prisco Roberto D, Yung Moti, Berlin: Springer
-
Au Man H, Susilo Willy, Mu Yi. Constant-size dynamic k-TAA//Prisco Roberto D, Yung Moti. Security and Cryptography for Networks. Berlin: Springer, 2006: 111-125.
-
(2006)
Security and Cryptography for Networks
, pp. 111-125
-
-
Au, M.H.1
Willy, S.2
Mu, Y.3
-
9
-
-
84958612917
-
Efficient group signature schemes for large groups
-
Kaliski Burton S, Berlin: Springer
-
Camenisch Jan, Stadler Markus. Efficient group signature schemes for large groups//Kaliski Burton S. Advances in Cryptology. Berlin: Springer, 1997: 410-424.
-
(1997)
Advances in Cryptology
, pp. 410-424
-
-
Jan, C.1
Markus, S.2
-
10
-
-
84990731886
-
How to prove yourself: Practical solutions to identification and signature problems
-
Odlyzko Andrew M, Berlin: Springer
-
Fiat Amos, Shamir Adi. How to prove yourself: Practical solutions to identification and signature problems//Odlyzko Andrew M. Advances in Cryptology. Berlin: Springer, 1987: 186-194.
-
(1987)
Advances in Cryptology
, pp. 186-194
-
-
Amos, F.1
Adi, S.2
-
11
-
-
84874324906
-
Identity-based encryption from the Weil pairing
-
Kilian Joe, Berlin: Springer
-
Boneh Dan, Franklin Matt. Identity-based encryption from the Weil pairing//Kilian Joe. Advances in Cryptology. Berlin: Springer, 2001: 213-229.
-
(2001)
Advances in Cryptology
, pp. 213-229
-
-
Dan, B.1
Matt, F.2
-
12
-
-
27244445470
-
Research on theory and approach of provable security
-
in Chinese
-
Feng Deng-Guo. Research on theory and approach of provable security. Journal of Software, 2005, 16(10): 1743-1756(in Chinese).
-
(2005)
Journal of Software
, vol.16
, Issue.10
, pp. 1743-1756
-
-
Feng, D.-G.1
-
13
-
-
78149363004
-
On the implementation of pairing-based cryptosystems
-
Ph. D. dissertation, Stanford University, Stanford
-
Lynn Ben. On the implementation of pairing-based cryptosystems[Ph. D. dissertation]. Stanford University, Stanford, 2007.
-
(2007)
-
-
Ben, L.1
-
14
-
-
84937428623
-
Efficient algorithms for pairing-based cryptosystems
-
Yung Moti, Berlin: Springer
-
Barreto, Paulo S L, Kim Hae Y, Lynn Ben, Scott Michael. Efficient algorithms for pairing-based cryptosystems//Yung Moti. Advances in Cryptology. Berlin: Springer, 2002: 354-369.
-
(2002)
Advances in Cryptology
, pp. 354-369
-
-
Barreto1
Paulo, S.L.2
Kim Hae, Y.3
Ben, L.4
Michael, S.5
-
16
-
-
35048887476
-
Short group signatures
-
Franklin Matt, Berlin: Springer
-
Boneh Dan, Boyen Xavier, Shacham Hovav. Short group signatures//Franklin Matt. Advances in Cryptology. Berlin: Springer, 2004: 41-55.
-
(2004)
Advances in Cryptology
, pp. 41-55
-
-
Dan, B.1
Xavier, B.2
Hovav, S.3
-
17
-
-
0035336179
-
New explicit conditions of elliptic curve traces for FR-reduction
-
Miyaji Atsuko, Nakabayashi Masaki, Takano Shunzo. New explicit conditions of elliptic curve traces for FR-reduction. IEICE Transactions on Fundamentals, 2001, 84-A(5): 1234-1243.
-
(2001)
IEICE Transactions on Fundamentals
, vol.84 A
, Issue.5
, pp. 1234-1243
-
-
Atsuko, M.1
Masaki, N.2
Shunzo, T.3
-
18
-
-
52149086372
-
Pairings in trusted computing
-
Galbraith Steven D, Paterson Kenneth G
-
Chen Li-Qun, Morrissey Paul, Smart Nigel P. Pairings in trusted computing//Galbraith Steven D, Paterson Kenneth G. Pairing-Based Cryptography. Berlin: Springer, 2008: 1-17.
-
(2008)
Pairing-Based Cryptography
, pp. 1-17
-
-
Chen, L.-Q.1
Paul, M.2
Smart Nigel, P.3
-
19
-
-
77952377083
-
Black-listable anonymous credentials: Blocking misbehaving users without TTPs
-
Alexandria, Virginia, USA
-
Tsang Patrick P, Au Man H, Kapadia Apu, Smith Sean W. Black-listable anonymous credentials: Blocking misbehaving users without TTPs//Proceedings of the ACM Conference on Computer and Communications Security. Alexandria, Virginia, USA, 2007: 72-81.
-
(2007)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 72-81
-
-
Tsang Patrick, P.1
Au Man, H.2
Apu, K.3
Smith Sean, W.4
|