-
2
-
-
34547182340
-
Virtual monotonic counters and count-limited objects using a TPM without a trusted OS
-
L. Sarmenta, M. van Dijk, C. O'Donnell, J. Rhodes, and S. Devadas, "Virtual monotonic counters and count-limited objects using a TPM without a trusted OS," in ACM CCS-STC '06, 2006, pp. 27-42.
-
(2006)
ACM CCS-STC '06
, pp. 27-42
-
-
Sarmenta, L.1
Van Dijk, M.2
O'Donnell, C.3
Rhodes, J.4
Devadas, S.5
-
3
-
-
0002187137
-
Wallet databases with observers
-
(extended abstract), Springer-Verlag
-
D. Chaum and T. P. Pedersen, "Wallet databases with observers (extended abstract)," in Advances in Cryptology - CRYPTO 92. Springer-Verlag, 1992, pp. 89-105.
-
(1992)
Advances in Cryptology - CRYPTO 92
, pp. 89-105
-
-
Chaum, D.1
Pedersen, T.P.2
-
4
-
-
78649233229
-
-
chapter 10, Trusted Computing. C. Mitchell
-
S. Balfe, A. Lakhani, and K. Paterson, Securing peer-to-peer networks using trusted computing, chapter 10, Trusted Computing. C. Mitchell, 2005.
-
(2005)
Securing Peer-to-peer Networks Using Trusted Computing
-
-
Balfe, S.1
Lakhani, A.2
Paterson, K.3
-
5
-
-
33750252128
-
Private information storage with logarithmic-space secure hardware
-
A. Illiev and S. Smith, "Private information storage with logarithmic-space secure hardware," in Workshop on Information Security, Management, Education and Privacy, 2004, pp. 210-216.
-
Workshop on Information Security, Management, Education and Privacy, 2004
, pp. 210-216
-
-
Illiev, A.1
Smith, S.2
-
6
-
-
78649309769
-
Offline untrusted storage with immediate detection of forking and replay attacks
-
M. van Dijk, J. Rhodes, L. Sarmenta, and S. Devadas, "Offline untrusted storage with immediate detection of forking and replay attacks," in ACM CCS-STC '07, 2007, pp. 41-48.
-
(2007)
ACM CCS-STC '07
, pp. 41-48
-
-
Van Dijk, M.1
Rhodes, J.2
Sarmenta, L.3
Devadas, S.4
-
7
-
-
77952132371
-
Flicker: An execution infrastructure for TCB minimization
-
J. McCune, B. Parno, A. Perrig, M. Reiter, and H. Isozaki, "Flicker: An execution infrastructure for TCB minimization," in EuroSys, 2008, pp. 315-328.
-
(2008)
EuroSys
, pp. 315-328
-
-
McCune, J.1
Parno, B.2
Perrig, A.3
Reiter, M.4
Isozaki, H.5
-
8
-
-
38049150653
-
Universally composable multi-party computation using tamper-proof hardware
-
J. Katz, "Universally composable multi-party computation using tamper-proof hardware," in EUROCRYPT '07, 2007, pp. 115-128.
-
(2007)
EUROCRYPT '07
, pp. 115-128
-
-
Katz, J.1
-
9
-
-
44449160378
-
Isolated proofs of knowledge and isolated zero knowledge
-
I. Damgard, J. B. Nielsen, and D. Wichs, "Isolated proofs of knowledge and isolated zero knowledge," in EUROCRYPT '08, 2008, pp. 509-526.
-
(2008)
EUROCRYPT '08
, pp. 509-526
-
-
Damgard, I.1
Nielsen, J.B.2
Wichs, D.3
-
10
-
-
54249137843
-
Generalized non-interactive oblivious transfer using count-limited objects with applications to secure mobile gents
-
V. Gunupudi and S. R. Tate, "Generalized non-interactive oblivious transfer using count-limited objects with applications to secure mobile gents," in Financial Cryptography, 2008, pp. 98-112.
-
(2008)
Financial Cryptography
, pp. 98-112
-
-
Gunupudi, V.1
Tate, S.R.2
-
11
-
-
51849168583
-
One-time programs
-
S. Goldwasser, Y. Kalai, and G. Rothblum, "One-time programs," in CRYPTO '08, 2008, pp. 39-56.
-
(2008)
CRYPTO '08
, pp. 39-56
-
-
Goldwasser, S.1
Kalai, Y.2
Rothblum, G.3
-
15
-
-
78649243600
-
Timing-accurate TPM simulation for what-if explorations in trusted computing
-
To appear in
-
V. Gunupudi and S. R. Tate, "Timing-accurate TPM simulation for what-if explorations in trusted computing," To appear in SPECTS '10.
-
SPECTS '10
-
-
Gunupudi, V.1
Tate, S.R.2
|