Direct Anonymous Attestation

Results: 46



#Item
31This is the author’s version of a work that was submitted/accepted for publication in the following source: Suriadi, Suriadi, Ouyang, Chun, & Foo, Ernest[removed]Privacy compliance verification in cryptographic protocol

This is the author’s version of a work that was submitted/accepted for publication in the following source: Suriadi, Suriadi, Ouyang, Chun, & Foo, Ernest[removed]Privacy compliance verification in cryptographic protocol

Add to Reading List

Source URL: eprints.qut.edu.au

Language: English - Date: 2013-03-06 18:15:10
32vii  TABLE OF CONTENTS CHAPTER

vii TABLE OF CONTENTS CHAPTER

Add to Reading List

Source URL: eprints.utm.my

Language: English - Date: 2012-07-15 20:40:54
33Falsification Prevention and Protection Technologies and Products  NEC’s Attitude to “Trusted Computing” By Takahisa SHIRAKAWA*  NEC attaches great importance to security for its business PCs (The brand names of NE

Falsification Prevention and Protection Technologies and Products NEC’s Attitude to “Trusted Computing” By Takahisa SHIRAKAWA* NEC attaches great importance to security for its business PCs (The brand names of NE

Add to Reading List

Source URL: www.nec.com

Language: English - Date: 2013-10-21 08:29:13
34The American University in Cairo School of Sciences and Engineering Using Trusted Platform Module for securing virtual environment access in Cloud

The American University in Cairo School of Sciences and Engineering Using Trusted Platform Module for securing virtual environment access in Cloud

Add to Reading List

Source URL: dar.aucegypt.edu

Language: English - Date: 2015-01-15 17:00:14
35Blacklistable Anonymous Credentials: Blocking Misbehaving Users without TTPs Patrick P. Tsang† , Man Ho Au§ , Apu Kapadia†‡ , Sean W. Smith† †  Department of Computer Science

Blacklistable Anonymous Credentials: Blocking Misbehaving Users without TTPs Patrick P. Tsang† , Man Ho Au§ , Apu Kapadia†‡ , Sean W. Smith† † Department of Computer Science

Add to Reading List

Source URL: www.cs.indiana.edu

Language: English - Date: 2007-09-30 19:44:28
36Exploring Trusted Platform Module Capabilities: A Theoretical and Experimental Study

Exploring Trusted Platform Module Capabilities: A Theoretical and Experimental Study

Add to Reading List

Source URL: nsl.cse.unt.edu

Language: English - Date: 2011-12-22 15:11:06
37IBM Corporation’s identity management point of view

IBM Corporation’s identity management point of view

Add to Reading List

Source URL: www.cio.gov.bc.ca

Language: English - Date: 2010-11-27 16:49:19
38NIST/NSTIC-IDtrust 2012-NISTs Privacy Enhancing Cryptography Workshop

NIST/NSTIC-IDtrust 2012-NISTs Privacy Enhancing Cryptography Workshop

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-09 10:08:20
39TCG Software Stack (TSS) Specification Version 1.2 Level 1 Errata A Part1: Commands and Structures

TCG Software Stack (TSS) Specification Version 1.2 Level 1 Errata A Part1: Commands and Structures

Add to Reading List

Source URL: www.trustedcomputinggroup.org

Language: English - Date: 2009-04-01 21:38:38
40e-EMV: Emulating EMV for Internet payments using Trusted Computing technology Shane Balfe and Kenneth G. Paterson, Information Security Group, Royal Holloway, University of London, Egham, Surrey, TW20 0EX, United Kingdom

e-EMV: Emulating EMV for Internet payments using Trusted Computing technology Shane Balfe and Kenneth G. Paterson, Information Security Group, Royal Holloway, University of London, Egham, Surrey, TW20 0EX, United Kingdom

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2008-02-29 12:44:11