1,184 results on '"Direct Anonymous Attestation"'
Search Results
2. Pass-As-You-Go: A Direct Anonymous Attestation-Based Untraceable Contactless Transit Pass
3. VeloCash: Anonymous Decentralized Probabilistic Micropayments With Transferability
4. k-times attribute-based authentication scheme using direct anonymous attestation
5. Security Keys: Practical Cryptographic Second Factors for the Modern Web
6. Using Intel Software Guard Extensions for Efficient Two-Party Secure Function Evaluation
7. Trusted Computing and DRM
8. REWIRE – Revocation Without Resolution: A Privacy-Friendly Revocation Mechanism for Vehicular Ad-Hoc Networks
9. DAA-A: Direct Anonymous Attestation with Attributes
10. Mdaak: A Flexible and Efficient Framework for Direct Anonymous Attestation on Mobile Devices
11. Quick Tutorial on TPM 2.0
12. History of the TPM
13. Measuring the NFC Peer-to-Peer Data Rate
14. TPM2 Operation
15. Basics of Trusted Platforms
16. Customer Configuration of TPM2 and Its Host Platform
17. Privacy at the Next Level: Intel’s Enhanced Privacy Identification (EPID) Technology
18. 基于直接匿名证明的k 次属性认证方案.
19. Lightweight multi-coupon system for multi-merchant environments with DAA
20. Anonymity and rewards in peer rating systems1
21. A Novel Direct Anonymous Attestation Scheme Using Secure Two-Party Computation
22. A Cryptographic Analysis of OPACITY : (Extended Abstract)
23. Improving Trusted Tickets with State-Bound Keys
24. Modification and Optimisation of an ElGamal-Based PVSS Scheme
25. Verifying a Privacy CA Remote Attestation Protocol
26. Computational Soundness of Symbolic Zero-Knowledge Proofs: Weaker Assumptions and Mechanized Verification
27. In Things We Trust? Towards Trustability in the Internet of Things : (Extended Abstract)
28. Domain-Specific Pseudonymous Signatures for the German Identity Card
29. Formal Analysis of Privacy in an eHealth Protocol
30. DAA Protocol Analysis and Verification
31. A (Corrected) DAA Scheme Using Batch Proof and Verification
32. Anonymous Ticketing for NFC-Enabled Mobile Phones
33. A Flexible Software Development and Emulation Framework for ARM TrustZone
34. How to Fix Two RSA-Based PVSS Schemes—Exploration and Solution
35. Formal Analysis of Anonymity in ECC-Based Direct Anonymous Attestation Schemes
36. Can We Use Platform Information Remotely?
37. Direct Anonymous Attestation: Enhancing Cloud Service User Privacy
38. Revocation for Delegatable Anonymous Credentials
39. One Time Anonymous Certificate: X.509 Supporting Anonymity
40. Anonymous RFID Authentication Using Trusted Computing Technologies
41. A DAA Scheme Requiring Less TPM Resources
42. Solving Revocation with Efficient Update of Anonymous Credentials
43. Anonymous Credentials for Java Enabled Platforms: A Performance Evaluation
44. An Anonymous Attestation Scheme with Optional Traceability
45. A DAA Scheme Using Batch Proof and Verification
46. A Pairing-Based DAA Scheme Further Reducing TPM Resources
47. Anonymous Client Authentication for Transport Layer Security
48. Using Compilers to Enhance Cryptographic Product Development
49. Trusted Computing
50. Verifying Anonymous Credential Systems in Applied Pi Calculus
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.