Direct Anonymous Attestation

Results: 46



#Item
31Direct Anonymous Attestation / Cryptographic primitive / Personally identifiable information / Trusted Platform Module / RSA / Cryptography / Public-key cryptography / Cryptographic protocols

This is the author’s version of a work that was submitted/accepted for publication in the following source: Suriadi, Suriadi, Ouyang, Chun, & Foo, Ernest[removed]Privacy compliance verification in cryptographic protocol

Add to Reading List

Source URL: eprints.qut.edu.au

Language: English - Date: 2013-03-06 18:15:10
32Trusted Platform Module / Next-Generation Secure Computing Base / Emulator / TPM / Virtual machine / Virtualization / Direct Anonymous Attestation / Computer security / Trusted computing / Cryptography

vii TABLE OF CONTENTS CHAPTER

Add to Reading List

Source URL: eprints.utm.my

Language: English - Date: 2012-07-15 20:40:54
33Disk encryption / Trusted Platform Module / Trusted Execution Technology / Windows Vista / Direct Anonymous Attestation / BitLocker Drive Encryption / Computer security / Trusted computing / Cryptography

Falsification Prevention and Protection Technologies and Products NEC’s Attitude to “Trusted Computing” By Takahisa SHIRAKAWA* NEC attaches great importance to security for its business PCs (The brand names of NE

Add to Reading List

Source URL: www.nec.com

Language: English - Date: 2013-10-21 08:29:13
34Trusted computing / Cryptography / Trusted Platform Module / Cryptographic software / Direct Anonymous Attestation / Trusted Computing Group / Cloud computing / Virtual machine / VirtualBox / Software / System software / Computer security

The American University in Cairo School of Sciences and Engineering Using Trusted Platform Module for securing virtual environment access in Cloud

Add to Reading List

Source URL: dar.aucegypt.edu

Language: English - Date: 2015-01-15 17:00:14
35Direct Anonymous Attestation / Internet privacy / Civil law / Authentication / Computer security / AKA / Cryptographic protocols / Security / Cryptography

Blacklistable Anonymous Credentials: Blocking Misbehaving Users without TTPs Patrick P. Tsang† , Man Ho Au§ , Apu Kapadia†‡ , Sean W. Smith† † Department of Computer Science

Add to Reading List

Source URL: www.cs.indiana.edu

Language: English - Date: 2007-09-30 19:44:28
36Trusted Platform Module / Trusted Computing Group / Next-Generation Secure Computing Base / Trusted Execution Technology / TPM / Random oracle / Secure two-party computation / Direct Anonymous Attestation / Computer security / Trusted computing / Cryptography

Exploring Trusted Platform Module Capabilities: A Theoretical and Experimental Study

Add to Reading List

Source URL: nsl.cse.unt.edu

Language: English - Date: 2011-12-22 15:11:06
37Federated identity / Security / Cryptography / Identity 2.0 / Security Assertion Markup Language / Direct Anonymous Attestation / Trusted Computing / Liberty Alliance / Credential / Identity management / Identity / Computer security

IBM Corporation’s identity management point of view

Add to Reading List

Source URL: www.cio.gov.bc.ca

Language: English - Date: 2010-11-27 16:49:19
38Public-key cryptography / Direct Anonymous Attestation / Marc Rotenberg / Privacy / Secure multi-party computation / Digital signature / Index of cryptography articles / Cryptography / Internet privacy / Cryptographic protocols

NIST/NSTIC-IDtrust 2012-NISTs Privacy Enhancing Cryptography Workshop

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-09 10:08:20
39Trusted Computing Group / Trusted Platform Module / Direct Anonymous Attestation / TSS / Computer security / Cryptography / Trusted computing

TCG Software Stack (TSS) Specification Version 1.2 Level 1 Errata A Part1: Commands and Structures

Add to Reading List

Source URL: www.trustedcomputinggroup.org

Language: English - Date: 2009-04-01 21:38:38
40Finance / EMV / Smart card / Credit card / Debit card / Payment card / Interac / Direct Anonymous Attestation / Trusted Computing / Payment systems / Business / Money

e-EMV: Emulating EMV for Internet payments using Trusted Computing technology Shane Balfe and Kenneth G. Paterson, Information Security Group, Royal Holloway, University of London, Egham, Surrey, TW20 0EX, United Kingdom

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2008-02-29 12:44:11
UPDATE