메뉴 건너뛰기




Volumn 2003-January, Issue , 2003, Pages 383-388

Privacy and trusted computing

Author keywords

Acceleration; Application software; Computer architecture; Computer network reliability; Computer networks; Information security; Large scale systems; Operating systems; Personal communication networks; Privacy

Indexed keywords

ACCELERATION; APPLICATION PROGRAMS; COMPUTER ARCHITECTURE; COMPUTER NETWORKS; COMPUTER OPERATING SYSTEMS; COMPUTER PRIVACY; DATA PRIVACY; EXPERT SYSTEMS; LARGE SCALE SYSTEMS; NETWORK ARCHITECTURE; PERSONAL COMMUNICATION SYSTEMS; SECURITY OF DATA; SOFTWARE RELIABILITY; SPECIFICATIONS; TELECOMMUNICATION NETWORKS;

EID: 84942771624     PISSN: 15294188     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/DEXA.2003.1232052     Document Type: Conference Paper
Times cited : (34)

References (12)
  • 5
    • 0013175080 scopus 로고    scopus 로고
    • An efficient system for non-transferable anonymous credentials with optional anonymity revocation
    • Report March
    • Jan Camenisch and Anna Lysyanskaya. An efficient system for non-transferable anonymous credentials with optional anonymity revocation. Report 2001/019, Cryptology ePrint Archive, March 2001.
    • (2001) Cryptology ePrint Archive
    • Camenisch, J.1    Lysyanskaya, A.2
  • 7
    • 84939573910 scopus 로고    scopus 로고
    • Differential power analysis
    • Michael Wiener, editor, Advances in Cryptology - CRYPTO '99, International Association for Cryptologic Research, Springer- Verlag, Berlin Germany, August
    • Paul Kocher, Joshua Jaffe, and Benjamin Jun. Differential power analysis. In Michael Wiener, editor, Advances in Cryptology - CRYPTO '99, number 1666 in Lecture Notes in Computer Science, pages 399-397. International Association for Cryptologic Research, Springer-Verlag, Berlin Germany, August 1999.
    • (1999) Lecture Notes in Computer Science , Issue.1666 , pp. 399-397
    • Kocher, P.1    Jaffe, J.2    Jun, B.3
  • 9
    • 0016555241 scopus 로고
    • The protection of information in computer systems
    • September
    • Jerome H. Saltzer and Michael D. Schroeder. The protection of information in computer systems. Proceedings of the IEEE, 63(9):1278-1308, September 1975.
    • (1975) Proceedings of the IEEE , vol.63 , Issue.9 , pp. 1278-1308
    • Saltzer, J.H.1    Schroeder, M.D.2
  • 12
    • 84946849368 scopus 로고    scopus 로고
    • Self-blindable credential certificates from the weil pairing
    • E. Verheul. Self-blindable credential certificates from the weil pairing. In Advances in Cryptology - ASIACRYPT 2001, volume 2248, pages 533-551, 2001.
    • (2001) Advances in Cryptology - ASIACRYPT 2001 , vol.2248 , pp. 533-551
    • Verheul, E.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.