Back to Results
First PageMeta Content
Direct Anonymous Attestation / Cryptographic primitive / Personally identifiable information / Trusted Platform Module / RSA / Cryptography / Public-key cryptography / Cryptographic protocols


This is the author’s version of a work that was submitted/accepted for publication in the following source: Suriadi, Suriadi, Ouyang, Chun, & Foo, Ernest[removed]Privacy compliance verification in cryptographic protocol
Add to Reading List

Document Date: 2013-03-06 18:15:10


Open Document

File Size: 843,16 KB

Share Result on Facebook

City

Brisbane / /

Company

Queensland Research Laboratory / SP2 / /

Country

Australia / /

/

Event

FDA Phase / /

Facility

Queensland University of Technology / /

IndustryTerm

cryptographic protocols / e.g. authentication protocols / applied cryptographic protocols / trustworthy security protocols / communication protocols / protocols privacy enhancing protocols / cryptographic algorithm / on-line seller / privacy enhancing protocol / /

Organization

Queensland University of Technology / Science and Engineering Faculty / /

Person

Sect / /

Position

author / CPN model / guard / transition guard / representative / anonymity revocation manager / Private Information Escrow Bound / /

Product

KE-1 / PE-4 / /

ProgrammingLanguage

Standard ML / /

ProvinceOrState

Prince Edward Island / /

PublishedMedium

Lecture Notes in Computer Science / /

Technology

encryption / functional programming / applied cryptographic protocols / e.g. authentication protocols / privacy enhancing protocol / private key / trustworthy security protocols / simulation / PK protocol / communication protocols / UCHVE encryption / actual encryption / protocols privacy enhancing protocols / cryptographic algorithm / /

URL

http /

SocialTag