Direct Anonymous Attestation

Results: 46



#Item
11

Formal analysis of anonymity in ECC-based Direct Anonymous Attestation schemes? Ben Smyth1 , Mark Ryan2 , and Liqun Chen3 1 2

Add to Reading List

Source URL: www.cs.bham.ac.uk

Language: English - Date: 2011-09-05 09:16:45
    12

    Direct Anonymous Attestation (DAA): Ensuring privacy with corrupt administrators Ben Smyth Mark Ryan

    Add to Reading List

    Source URL: www.cs.bham.ac.uk

    Language: English - Date: 2010-03-26 11:16:11
      13

      Direct Anonymous Attestation (DAA): Ensuring privacy with corrupt administrators (Extended version) ? ?? Last updated: January 9, 2008 Ben Smyth1 , Mark Ryan1 , and Liqun Chen2 1

      Add to Reading List

      Source URL: bensmyth.com

      Language: English - Date: 2012-05-24 07:24:42
        14

        Direct Anonymous Attestation (DAA): Ensuring Privacy with Corrupt Administrators, Ben Smyth1 , Mark Ryan1 , and Liqun Chen2 1 School of Computer Science,

        Add to Reading List

        Source URL: bensmyth.com

        Language: English - Date: 2012-05-24 07:24:42
          15

          Direct Anonymous Attestation (DAA): Ensuring privacy with corrupt administrators (Extended version) ? ?? Last updated: July 5, 2007 Ben Smyth1 , Mark Ryan1 , and Liqun Chen2 1

          Add to Reading List

          Source URL: www.cs.bham.ac.uk

          Language: English - Date: 2009-02-25 10:33:24
            16Cryptography / Computer security / Computing / Computer access control / Notary / Public-key cryptography / Identity management / Direct Anonymous Attestation / Password / Internet Relay Chat / Security token / Proxy server

            BNymble (a short paper) More anonymous blacklisting at almost no cost Peter Lofgren and Nicholas Hopper University of Minnesota Abstract. Anonymous blacklisting schemes allow online service providers

            Add to Reading List

            Source URL: www-users.cs.umn.edu

            Language: English - Date: 2010-12-16 18:40:43
            17Direct Anonymous Attestation / Internet privacy / Civil law / Authentication / Computer security / AKA / Cryptographic protocols / Security / Cryptography

            Blacklistable Anonymous Credentials: Blocking Misbehaving Users without TTPs Patrick P. Tsang† , Man Ho Au§ , Apu Kapadia†‡ , Sean W. Smith† † Department of Computer Science

            Add to Reading List

            Source URL: www.cs.dartmouth.edu

            Language: English - Date: 2008-03-13 10:38:08
            18Cryptographic protocols / Software / Computing / Bitcoin / Peer-to-peer computing / Credential / Direct Anonymous Attestation / Authentication / Proof of knowledge / Cryptography / Identity management / Security

            Decentralized Anonymous Credentials Christina Garman, Matthew Green, Ian Miers The Johns Hopkins University Department of Computer Science, Baltimore, USA {cgarman, mgreen, imiers}@cs.jhu.edu Abstract—Anonymous credent

            Add to Reading List

            Source URL: hms.isi.jhu.edu

            Language: English - Date: 2014-02-05 02:15:01
            19Direct Anonymous Attestation / Internet privacy / Group signature / Digital signature / Revocation list / Cryptography / Public-key cryptography / Key management

            Enhanced Privacy ID (EPID) Ernie Brickell and Jiangtao Li Intel Corporation 1

            Add to Reading List

            Source URL: csrc.nist.gov

            Language: English - Date: 2012-05-16 09:48:14
            20Disk encryption / Trusted Platform Module / Trusted Computing Group / Computer network security / Cryptographic software / BitLocker Drive Encryption / Trusted Network Connect / Next-Generation Secure Computing Base / Direct Anonymous Attestation / Computer security / Trusted computing / Cryptography

            Trusted Platform Module (TPM)

            Add to Reading List

            Source URL: www.trustedcomputinggroup.org

            Language: English - Date: 2009-03-28 00:28:27
            UPDATE