-
3
-
-
74049125197
-
Anonymous credentials on a standard java card
-
ACM, New York
-
Bichsel, P., Camenisch, J., Groß, T., Shoup, V.: Anonymous credentials on a standard java card. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS 2009, pp. 600-610. ACM, New York (2009)
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS 2009
, pp. 600-610
-
-
Bichsel, P.1
Camenisch, J.2
Groß, T.3
Shoup, V.4
-
5
-
-
14844295011
-
Direct Anonymous Attestation
-
ACM, New York
-
Brickell, E., Camenisch, J., Chen, L.: Direct Anonymous Attestation. In: Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004, pp. 132-145. ACM, New York (2004)
-
(2004)
Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004
, pp. 132-145
-
-
Brickell, E.1
Camenisch, J.2
Chen, L.3
-
6
-
-
34547379480
-
How to win the clonewars: Efficient periodic n-times anonymous authentication
-
ACM, New York
-
Camenisch, J., Hohenberger, S., Kohlweiss, M., Lysyanskaya, A., Meyerovich, M.: How to win the clonewars: efficient periodic n-times anonymous authentication. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006, pp. 201-210. ACM, New York (2006)
-
(2006)
Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006
, pp. 201-210
-
-
Camenisch, J.1
Hohenberger, S.2
Kohlweiss, M.3
Lysyanskaya, A.4
Meyerovich, M.5
-
7
-
-
84945135810
-
An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation
-
Pfitzmann, B. (ed.) EUROCRYPT 2001. Springer, Heidelberg
-
Camenisch, J., Lysyanskaya, A.: An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 93-118. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2045
, pp. 93-118
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
8
-
-
0022145479
-
Security without identification: Transaction systems to make big brother obsolete
-
Chaum, D.: Security without identification: transaction systems to make big brother obsolete. Commun. ACM 28, 1030-1044 (1985)
-
(1985)
Commun. ACM
, vol.28
, pp. 1030-1044
-
-
Chaum, D.1
-
9
-
-
78650100316
-
Anonymous RFID Authentication Using Trusted Computing Technologies
-
Ors Yalcin, S.B. (ed.) RFIDSec 2010. Springer, Heidelberg
-
Dietrich, K.: Anonymous RFID Authentication Using Trusted Computing Technologies. In: Ors Yalcin, S.B. (ed.) RFIDSec 2010. LNCS, vol. 6370, pp. 91-102. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6370
, pp. 91-102
-
-
Dietrich, K.1
-
11
-
-
37849049105
-
-
Glenn, A., Goldberg, I., Légaré, F., Stiglic, A.: A description of protocols for private credentials (2001), http://crypto.cs. mcgill.ca/~stiglic/Papers/brands.pdf
-
(2001)
A Description of Protocols for Private Credentials
-
-
Glenn, A.1
Goldberg, I.2
Légaré, F.3
Stiglic, A.4
-
12
-
-
33645691385
-
Modular inverse algorithms without multiplications for cryptographic applications
-
January
-
Hars, L.: Modular inverse algorithms without multiplications for cryptographic applications. EURASIP J. Embedded Syst., 2 (January 2006)
-
(2006)
EURASIP J. Embedded Syst.
, vol.2
-
-
Hars, L.1
-
16
-
-
79955718926
-
-
October 17
-
Java Community Process. Contactless Communication API (JSR 257) (October 17, 2006), http://jcp.org/aboutJava/communityprocess/final/jsr257/index.html
-
(2006)
Contactless Communication API (JSR 257)
-
-
-
17
-
-
84865694378
-
-
December 11
-
Java Community Process. Java Smart Card I/O API (JSR 268) (December 11, 2006), http://jcp.org/aboutJava/communityprocess/final/jsr268/index.html
-
(2006)
Java Smart Card I/O API (JSR 268)
-
-
-
18
-
-
52149116674
-
Secure Communication between Web Browsers and NFC Targets by the Example of an e-Ticketing System
-
Psaila, G.,Wagner, R. (eds.) EC-Web 2008. Springer, Heidelberg
-
Madlmayr, G., Kleebauer, P., Langer, J., Scharinger, J.: Secure Communication between Web Browsers and NFC Targets by the Example of an e-Ticketing System. In: Psaila, G.,Wagner, R. (eds.) EC-Web 2008. LNCS, vol. 5183, pp. 1-10. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5183
, pp. 1-10
-
-
Madlmayr, G.1
Kleebauer, P.2
Langer, J.3
Scharinger, J.4
-
20
-
-
77949839785
-
Efficient implementation of anonymous credentials on java card smart cards
-
IEEE, London
-
Sterckx, M., Gierlichs, B., Preneel, B., Verbauwhede, I.: Efficient implementation of anonymous credentials on java card smart cards. In: 1st IEEE International Workshop on Information Forensics and Security (WIFS 2009), pp. 106-110. IEEE, London (2009)
-
(2009)
1st IEEE International Workshop on Information Forensics and Security (WIFS 2009)
, pp. 106-110
-
-
Sterckx, M.1
Gierlichs, B.2
Preneel, B.3
Verbauwhede, I.4
-
22
-
-
70350605716
-
Performance Issues of Selective Disclosure and Blinded Issuing Protocols on Java Card
-
Markowitch, O., Bilas, A., Hoepman, J.-H., Mitchell, C.J., Quisquater, J.-J. (eds.) WISTP 2009. Springer, Heidelberg
-
Tews, H., Jacobs, B.: Performance Issues of Selective Disclosure and Blinded Issuing Protocols on Java Card. In: Markowitch, O., Bilas, A., Hoepman, J.-H., Mitchell, C.J., Quisquater, J.-J. (eds.) WISTP 2009. LNCS, vol. 5746, pp. 95-111. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5746
, pp. 95-111
-
-
Tews, H.1
Jacobs, B.2
-
23
-
-
37149014768
-
Implementing Embedded Security on Dual-Virtual-CPU Systems
-
Wilson, P., Frey, A., Mihm, T., Kershaw, D., Alves, T.: Implementing Embedded Security on Dual-Virtual-CPU Systems. IEEE Design and Test of Computers 24(6), 582-591 (2007)
-
(2007)
IEEE Design and Test of Computers
, vol.24
, Issue.6
, pp. 582-591
-
-
Wilson, P.1
Frey, A.2
Mihm, T.3
Kershaw, D.4
Alves, T.5
-
24
-
-
84865683681
-
-
July 28, Public GIT repository at
-
Winter, J.,Wiegele, P., Lipp, M., Niederl, A., et al.: Experimental version of QEMU with basic support for ARM TrustZone (source code repository) (July 28, 2011), Public GIT repository at: https://github.com/jowinter/qemu- trustzone
-
(2011)
Experimental Version of QEMU with Basic Support for ARM TrustZone (Source Code Repository)
-
-
Winter, J.1
Wiegele, P.2
Lipp, M.3
Niederl, A.4
|