-
1
-
-
84952336128
-
RFIDSec 2010
-
Springer, Heidelberg
-
Berna, S., Yalcin, O. (eds.): RFIDSec 2010. LNCS, vol. 6370. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6370
-
-
Berna, S.1
Yalcin, O.2
-
2
-
-
74049125197
-
Anonymous credentials on a standard java card
-
ACM, New York
-
Bichsel, P., Camenisch, J., Groß, T., Shoup, V.: Anonymous credentials on a standard java card. In: CCS 2009: Proceedings of the 16th ACM Conference on Computer and Communications Security, pp. 600-610. ACM, New York (2009)
-
(2009)
CCS 2009: Proceedings of the 16th ACM Conference on Computer and Communications Security
, pp. 600-610
-
-
Bichsel, P.1
Camenisch, J.2
Groß, T.3
Shoup, V.4
-
3
-
-
14844295011
-
Direct Anonymous Attestation
-
vol. November
-
Brickell, E., Camenisch, J., Chen, L.: Direct Anonymous Attestation. In: Proceedings of the 11th ACM Conference on Computer and Communications Security, Washington DC, vol.(5), pp. 132-145 (November 2004)
-
(2004)
Proceedings of the 11th ACM Conference on Computer and Communications Security, Washington DC
, Issue.5
, pp. 132-145
-
-
Brickell, E.1
Camenisch, J.2
Chen, L.3
-
5
-
-
78650117770
-
-
Cryptology ePrint Archive, Report 2009/598
-
Chen, L., Page, D., Smart, N.P.: On the Design and Implementation of an Efficient DAA Scheme. Cryptology ePrint Archive, Report 2009/598 (2009), http://eprint.iacr.org/
-
(2009)
On the Design and Implementation of An Efficient DAA Scheme
-
-
Chen, L.1
Page, D.2
Smart, N.P.3
-
6
-
-
79959563402
-
An Integrated Architecture for Trusted Computing for Java Enabled Embedded Devices
-
ACM, New York
-
Dietrich, K.: An Integrated Architecture for Trusted Computing for Java Enabled Embedded Devices. In: STC 2007, pp. 2-6. ACM, New York (2007)
-
(2007)
STC 2007
, pp. 2-6
-
-
Dietrich, K.1
-
7
-
-
77954984214
-
Anonymous Credentials for Java Enabled Platforms: A Performance Evaluation
-
Chen, L., Yung, M. (eds.) INTRUST 2009 Springer, Heidelberg
-
Dietrich, K.: Anonymous Credentials for Java Enabled Platforms: A Performance Evaluation. In: Chen, L., Yung, M. (eds.) INTRUST 2009. LNCS, vol. 6163, pp. 88-103. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6163
, pp. 88-103
-
-
Dietrich, K.1
-
8
-
-
77954641220
-
Anonymous client authentication for transport layer security
-
De Decker, B., Schaumüller-Bichl, I. (eds.) CMS 2010 Springer, Heidelberg
-
Dietrich, K.: Anonymous client authentication for transport layer security. In: De Decker, B., Schaumüller-Bichl, I. (eds.) CMS 2010. LNCS, vol. 6109, pp. 268-280. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6109
, pp. 268-280
-
-
Dietrich, K.1
-
9
-
-
70350686777
-
Implementation Aspects of Mobile and Embedded Trusted Computing
-
Chen, L., Mitchell, C.J., Martin, A. (eds.) Trust 2009 Springer, Heidelberg
-
Dietrich, K., Winter, J.: Implementation Aspects of Mobile and Embedded Trusted Computing. In: Chen, L., Mitchell, C.J., Martin, A. (eds.) Trust 2009. LNCS, vol. 5471, pp. 29-44. Springer, Heidelberg (2009), http://dblp.uni-trier. de/db/conf/trust/trust2009.html#DietrichW09
-
(2009)
LNCS
, vol.5471
, pp. 29-44
-
-
Dietrich, K.1
Winter, J.2
-
11
-
-
0004115865
-
-
Myers, M., Ankney, R., Malpani, A., Galperin, S., Adams, C.: X.509 Internet Public Key Infrastructure Online Certificate Status Protocol - OCSP (1999)
-
(1999)
X.509 Internet Public Key Infrastructure Online Certificate Status Protocol - OCSP
-
-
Myers, M.1
Ankney, R.2
Malpani, A.3
Galperin, S.4
Adams, C.5
-
12
-
-
38149070279
-
Direct Anonymous Attestation (DAA): Ensuring Privacy with Corrupt Administrators
-
Stajano, F., Meadows, C., Capkun, S., Moore, T. (eds.) ESAS 2007 Springer, Heidelberg
-
Smyth, B., Ryan, M.D., Chen, L.: Direct Anonymous Attestation (DAA): Ensuring Privacy with Corrupt Administrators. In: Stajano, F., Meadows, C., Capkun, S., Moore, T. (eds.) ESAS 2007. LNCS, vol. 4572, pp. 218-231. Springer, Heidelberg (2007), http://dblp.uni-trier.de/db/conf/esas/esas2007.html#SmythRC07
-
(2007)
LNCS
, vol.4572
, pp. 218-231
-
-
Smyth, B.1
Ryan, M.D.2
Chen, L.3
-
13
-
-
77949839785
-
Efficient Implementation of Anonymous Credentials on Java Card Smart Cards
-
IEEE, London
-
Sterckx, M., Gierlichs, B., Preneel, B., Verbauwhede, I.: Efficient Implementation of Anonymous Credentials on Java Card Smart Cards. In: 1st IEEE International Workshop on Information Forensics and Security (WIFS 2009), pp. 106-110. IEEE, London (2009)
-
(2009)
1st IEEE International Workshop on Information Forensics and Security (WIFS 2009)106-110.
-
-
Sterckx, M.1
Gierlichs, B.2
Preneel, B.3
Verbauwhede, I.4
-
14
-
-
33846308692
-
-
Trusted Computing Group Version 1.2 Level 1, part 1: Commands and Structures January 6
-
Trusted Computing Group: TCG Software Stack (TSS) Specification Version 1.2 Level 1, part 1: Commands and Structures (January 6, 2006)
-
(2006)
TCG Software Stack (TSS) Specification
-
-
-
15
-
-
80053610542
-
-
Trusted Computing Group Version 1.2, Revision 103. Tech. rep., Trusted Computing Group October 26
-
Trusted Computing Group: TPM Main Specification Level 2 Version 1.2, Revision 103. Tech. rep., Trusted Computing Group (October 26, 2006)
-
(2006)
TPM Main Specification Level 2
-
-
-
16
-
-
85037135907
-
Lightweight Anonymous Authentication with TLS and DAA for Embedded Mobile Devices
-
Burmester, M., Tsudik, G., Magliveras, S., Ilić, I. (eds.) ISC 2010 Springer, Heidelberg
-
Wachsmann, C., Chen, L., Dietrich, K., Löhr, H., Sadeghi, A.-R., Winter, J.: Lightweight Anonymous Authentication with TLS and DAA for Embedded Mobile Devices. In: Burmester, M., Tsudik, G., Magliveras, S., Ilić, I. (eds.) ISC 2010. LNCS, vol. 6531, pp. 84-98. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6531
, pp. 84-98
-
-
Wachsmann, C.1
Chen, L.2
Dietrich, K.3
Löhr, H.4
Sadeghi, A.-R.5
Winter, J.6
|