-
1
-
-
71849091813
-
Exploiting cryptography for privacy-enhanced access control: A result of the PRIME project
-
Ardagna, C., Camenisch, J., Kohlweiss, M., Leenes, R., Neven, G., Priem, B., Samarati, P., Sommer, D., Verdicchio, M.: Exploiting cryptography for privacy-enhanced access control: A result of the PRIME project. Journal of Computer Security 18, 123-160 (2010)
-
(2010)
Journal of Computer Security
, vol.18
, pp. 123-160
-
-
Ardagna, C.1
Camenisch, J.2
Kohlweiss, M.3
Leenes, R.4
Neven, G.5
Priem, B.6
Samarati, P.7
Sommer, D.8
Verdicchio, M.9
-
2
-
-
79251548347
-
-
September
-
ARM: TrustZone website (September 2009), http://www.arm.com/products/ security/trustzone/
-
(2009)
TrustZone Website
-
-
-
3
-
-
79251559790
-
Instruction set architectures
-
February
-
ARM, Ltd.: Instruction set architectures. ARM White Paper (February 2008), http://www.arm.com/products/processors/technologies/instruction-set- architectures.php
-
(2008)
ARM White Paper
-
-
-
4
-
-
77954714208
-
M-Shield™ mobile security technology: Making wireless secure
-
February
-
Azema, J., Fayad, G.: M-Shield™ mobile security technology: Making wireless secure. Texas Instruments White Paper (February 2008), http://focus.ti.com/pdfs/wtbu/ti-mshield-whitepaper.pdf
-
(2008)
Texas Instruments White Paper
-
-
Azema, J.1
Fayad, G.2
-
5
-
-
78650741140
-
Developing efficient blinded attribute certificates on smart cards via pairings
-
Gollmann, D., Lanet, J.-L., Iguchi-Cartigny, J. (eds.) CARDIS 2010. Springer, Heidelberg
-
Batina, L., Hoepman, J.H., Jacobs, B., Mostowski, W., Vullers, P.: Developing efficient blinded attribute certificates on smart cards via pairings. In: Gollmann, D., Lanet, J.-L., Iguchi-Cartigny, J. (eds.) CARDIS 2010. LNCS, vol. 6035, pp. 209-222. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6035
, pp. 209-222
-
-
Batina, L.1
Hoepman, J.H.2
Jacobs, B.3
Mostowski, W.4
Vullers, P.5
-
6
-
-
77954699328
-
Cryptographic protocols of the identity mixer library
-
Tech. Rep. RZ 3730 (#99740)
-
Bichsel, P., Binding, C., Camenisch, J., Groß, T., Heydt-Benjamin, T., Sommer, D., Zaverucha, G.: Cryptographic protocols of the identity mixer library. Tech. Rep. RZ 3730 (#99740), IBM Research (2009)
-
(2009)
IBM Research
-
-
Bichsel, P.1
Binding, C.2
Camenisch, J.3
Groß, T.4
Heydt-Benjamin, T.5
Sommer, D.6
Zaverucha, G.7
-
7
-
-
74049125197
-
Anonymous credentials on a standard Java Card
-
ACM Press, New York
-
Bichsel, P., Camenisch, J., Groß, T., Shoup, V.: Anonymous credentials on a standard Java Card. In: Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS 2009). ACM Press, New York (2009)
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS 2009)
-
-
Bichsel, P.1
Camenisch, J.2
Groß, T.3
Shoup, V.4
-
8
-
-
34447131375
-
-
Blake-Wilson, S., Nystrom, M., Hopwood, D., Mikkelsen, J., Wright, T.: Transport layer security (TLS) extensions (2003)
-
(2003)
Transport Layer Security (TLS) Extensions
-
-
Blake-Wilson, S.1
Nystrom, M.2
Hopwood, D.3
Mikkelsen, J.4
Wright, T.5
-
9
-
-
14844295011
-
Direct Anonymous Attestation
-
ACM Press, New York
-
Brickell, E., Camenisch, J., Chen, L.: Direct Anonymous Attestation. In: Proceedings of the 11th ACM Conference on Computer and Communications Security (CCS 2004), pp. 132-145. ACM Press, New York (2004)
-
(2004)
Proceedings of the 11th ACM Conference on Computer and Communications Security (CCS 2004)
, pp. 132-145
-
-
Brickell, E.1
Camenisch, J.2
Chen, L.3
-
10
-
-
84945135810
-
An efficient system for non-transferable anonymous credentials with optional anonymity revocation
-
Pfitzmann, B. (ed.) EUROCRYPT 2001. Springer, Heidelberg
-
Camenisch, J., Lysyanskaya, A.: An efficient system for non-transferable anonymous credentials with optional anonymity revocation. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 93-118. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2045
, pp. 93-118
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
11
-
-
35048845114
-
Signature schemes and anonymous credentials from bilinear maps
-
Franklin, M. (ed.) CRYPTO 2004. Springer, Heidelberg
-
Camenisch, J., Lysyanskaya, A.: Signature schemes and anonymous credentials from bilinear maps. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 56-72. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3152
, pp. 56-72
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
12
-
-
77954709221
-
Anonymous authentication with TLS and DAA
-
Acquisti, A., Smith, S.W., Sadeghi, A.-R. (eds.) TRUST 2010. Springer, Heidelberg
-
Cesena, E., Löhr, H., Ramunno, G., Sadeghi, A.R., Vernizzi, D.: Anonymous authentication with TLS and DAA. In: Acquisti, A., Smith, S.W., Sadeghi, A.-R. (eds.) TRUST 2010. LNCS, vol. 6101, pp. 47-62. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6101
, pp. 47-62
-
-
Cesena, E.1
Löhr, H.2
Ramunno, G.3
Sadeghi, A.R.4
Vernizzi, D.5
-
13
-
-
0022145479
-
Security without identification: Transaction systems to make big brother obsolete
-
Chaum, D.: Security without identification: Transaction systems to make big brother obsolete. Communications of the ACM 28(10), 1030-1044 (1985)
-
(1985)
Communications of the ACM
, vol.28
, Issue.10
, pp. 1030-1044
-
-
Chaum, D.1
-
14
-
-
79251588132
-
-
(full version). ePrint
-
Chen, L., Dietrich, K., Löhr, H., Sadeghi, A.R., Wachsmann, C., Winter, J.: Lightweight anonymous authentication with TLS and DAA for embedded mobile devices (full version). ePrint (2010)
-
(2010)
Lightweight Anonymous Authentication with TLS and DAA for Embedded Mobile Devices
-
-
Chen, L.1
Dietrich, K.2
Löhr, H.3
Sadeghi, A.R.4
Wachsmann, C.5
Winter, J.6
-
15
-
-
77954741944
-
On the design and implementation of an efficient DAA scheme
-
Gollmann, D., Lanet, J.-L., Iguchi-Cartigny, J. (eds.) CARDIS 2010. Springer, Heidelberg
-
Chen, L., Page, D., Smart, N.P.: On the design and implementation of an efficient DAA scheme. In: Gollmann, D., Lanet, J.-L., Iguchi-Cartigny, J. (eds.) CARDIS 2010. LNCS, vol. 6035, pp. 223-237. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6035
, pp. 223-237
-
-
Chen, L.1
Page, D.2
Smart, N.P.3
-
16
-
-
77954644075
-
Anonymous credentials for Java enabled platforms
-
Chen, L., Yung, M. (eds.) INTRUST 2009. Springer, Heidelberg
-
Dietrich, K.: Anonymous credentials for Java enabled platforms. In: Chen, L., Yung, M. (eds.) INTRUST 2009. LNCS, vol. 6163, pp. 101-116. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6163
, pp. 101-116
-
-
Dietrich, K.1
-
17
-
-
84894578735
-
-
Google, Inc.: Google Maps Navigation, http://www.google.com/mobile/ navigation/
-
Google Maps Navigation
-
-
-
18
-
-
77954978051
-
-
June
-
Google, Inc.: Google Latitude (June 2010), http://www.google.com/latitude
-
(2010)
Google Latitude
-
-
-
19
-
-
77954736866
-
-
Lindell, A.Y.: Anonymous authentication. Aladdin Knowledge Systems Inc. (2006), http://www.aladdin.com/blog/pdf/AnonymousAuthentication.pdf
-
(2006)
Anonymous Authentication
-
-
Lindell, A.Y.1
-
20
-
-
79251551467
-
-
June
-
Loopt: Loopt website (June 2010), http://www.loopt.com/
-
(2010)
Loopt Website
-
-
-
21
-
-
67651053584
-
Pseudonym systems
-
Heys, H.M., Adams, C.M. (eds.) SAC 1999. Springer, Heidelberg
-
Lysyanskaya, A., Rivest, R.L., Sahai, A., Wolf, S.: Pseudonym systems. In: Heys, H.M., Adams, C.M. (eds.) SAC 1999. LNCS, vol. 1758, pp. 184-199. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1758
, pp. 184-199
-
-
Lysyanskaya, A.1
Rivest, R.L.2
Sahai, A.3
Wolf, S.4
-
22
-
-
26444607972
-
Dynamic k-times anonymous authentication
-
Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. Springer, Heidelberg
-
Nguyen, L., Safavi-Naini, R.: Dynamic k-times anonymous authentication. In: Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. LNCS, vol. 3531, pp. 318-333. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3531
, pp. 318-333
-
-
Nguyen, L.1
Safavi-Naini, R.2
-
23
-
-
79251567157
-
-
Nokia June
-
Nokia: OviMaps website (June 2010), http://maps.ovi.com/
-
(2010)
OviMaps Website
-
-
-
24
-
-
84956867779
-
Anonymous authentication of membership in dynamic groups
-
Franklin, M.K. (ed.) FC 1999. Springer, Heidelberg
-
Schechter, S., Parnell, T., Hartemink, A.: Anonymous authentication of membership in dynamic groups. In: Franklin, M.K. (ed.) FC 1999. LNCS, vol. 1648, pp. 184-195. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1648
, pp. 184-195
-
-
Schechter, S.1
Parnell, T.2
Hartemink, A.3
-
25
-
-
79251586033
-
-
Sense Networks, Inc. June
-
Sense Networks, Inc.: CitySense (June 2010), http://www.citysense.com/
-
(2010)
CitySense
-
-
-
26
-
-
79251584131
-
-
June
-
TomTom: TomTom website (June 2010), http://www.tomtom.com/
-
(2010)
TomTom Website
-
-
-
27
-
-
77954408441
-
-
Version 1.2, Revision 103 July
-
Trusted Computing Group: TCG TPM Specification, Version 1.2, Revision 103 (July 2007), http://www.trustedcomputinggroup.org/
-
(2007)
TCG TPM Specification
-
-
-
28
-
-
79251586946
-
-
Version 1.0, Revision 6 June
-
Trusted Computing Group: TCG MTM Specification, Version 1.0, Revision 6 (June 2008), http://www.trustedcomputinggroup.org/
-
(2008)
TCG MTM Specification
-
-
-
29
-
-
78249264846
-
-
June
-
Trusted Computing Group: TCG website (June 2010), https://www. trustedcomputinggroup.org
-
(2010)
TCG Website
-
-
|