History


Please fill in your query. A complete syntax description you will find on the General Help page.
first | previous | 1 21 41 | next | last

Result 1 to 20 of 50 total

Recent advances and existing research questions in platform security. (English)
Safavi-Naini, Reihaneh (ed.) et al., Advances in cryptology ‒ CRYPTO 2012. 32nd annual cryptology conference, Santa Barbara, CA, USA, August 19‒23, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-32008-8/pbk). Lecture Notes in Computer Science 7417, 570 (2012).
WorldCat.org
1
A (Corrected) DAA scheme using batch proof and verification. (English)
Chen, Liqun (ed.) et al., Trusted systems. Third international conference, INTRUST 2011, Beijing, China, November 27‒29, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-32297-6/pbk). Lecture Notes in Computer Science 7222, 304-337 (2012).
WorldCat.org
2
Enhanced Privacy ID: A Direct Anonymous Attestation Scheme with Enhanced Revocation Capabilities. (English)
IEEE Trans. Dependable Sec. Comput.IEEE Trans. Dependable Sec. Comput. 9, N0. 3, 345-360(2012)
WorldCat.org
3
A Static Diffie-Hellman Attack on Several Direct Anonymous Attestation Schemes. (English)
INTRUST, 95-111(2012)
WorldCat.org
4
’MotorcycleSim’: An Evaluation of Rider Interaction with an Innovative Motorcycle Simulator. (English)
Comput. J.Comput. J. 54, N0. 7, 1010-1025(2011)
WorldCat.org
5
Enhanced privacy ID from bilinear pairing for hardware authentication and attestation. (English)
IJIPSIIJIPSI 1, N0. 1, 3-33(2011)
WorldCat.org
6
A pairing-based DAA scheme further reducing TPM resources. (English)
Acquisti, Alessandro (ed.) et al., Trust and trustworthy computing. Third international conference, TRUST 2010, Berlin, Germany, June 21‒23, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-13868-3/pbk). Lecture Notes in Computer Science 6101, 181-195 (2010).
WorldCat.org
7
Simplified security notions of direct anonymous attestation and a concrete scheme from pairings. (English)
Int. J. Inf. Secur. 8, No. 5, 315-330 (2009).
WorldCat.org
8
A new direct anonymous attestation scheme from bilinear maps. (English)
Lipp, Peter (ed.) et al., Trusted computing ‒ challenges and applications. First international conference on trusted computing and trust in information technologies, TRUST 2008, Villach, Austria, March 11‒12, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-68978-2/pbk). Lecture Notes in Computer Science 4968, 166-178 (2008).
WorldCat.org
9
A vision for platform security. (English)
Oswald, Elisabeth (ed.) et al., Cryptographic hardware and embedded systems ‒ CHES 2008. 10th international workshop, Washington, D.C., USA, August 10‒13, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-85052-6/pbk). Lecture Notes in Computer Science 5154, 444 (2008).
WorldCat.org
10
Enhanced privacy id: a direct anonymous attestation scheme with enhanced revocation capabilities. (English)
WPES, 21-30(2007)
WorldCat.org
11
Direct anonymous attestation. (English)
ACM Conference on Computer and Communications Security, 132-145(2004)
WorldCat.org
12
Sharing block ciphers. (English)
Dawson, Ed (ed.) et al., Information security and privacy. 5th Australasian conference, ACISP 2000, Brisbane, Australia, July 10-12, 2000. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1841, 457-470 (2000).
WorldCat.org
13
Design validations for discrete logarithm based signature schemes. (English)
Imai, Hideki (ed.) et al., Public key cryptography. 3rd international workshop on Practice and theory in public key cryptosystems, PKC 2000, Melbourne, Victoria, Australia, January 18-20, 2000. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1751, 276-292 (2000).
WorldCat.org
14
Trustee-based tracing extensions to anonymous cash and the making of anonymous change. (English)
Clarkson, K. (ed.), Proceedings of the 6th annual ACM-SIAM symposium on discrete algorithms, San Francisco, CA, USA, January 22-24, 1995. Philadelphia, PA: SIAM. 457-466 (1995).
WorldCat.org
15
Fast exponentiation with precomputation. (Extended abstract). (English)
Rueppel, Rainer A. (ed.), Advances in cryptology ‒ EUROCRYPT ’92. Workshop on the theory and applications of cryptographic techniques, Balatonfüred, Hungary, May 24-28, 1992. Proceedings. Berlin: Springer- Verlag. Lect. Notes Comput. Sci. 658, 200-207 (1993).
WorldCat.org
16
Advances in Cryptology - CRYPTO ’92. 12th annual international cryptology conference, Santa Barbara, CA, USA, August 16-20, 1992. Proceedings. (English)
Lecture Notes in Computer Science. 740. Berlin: Springer-Verlag. X, 593 p. DM 114.00; öS 889.20; sFr 114.00 /sc (1993).
WorldCat.org
17
The Number of Distinct Subset Sums of a Finite Set of Vectors. (English)
J. Comb. Theory, Ser. AJ. Comb. Theory, Ser. A 63, N0. 2, 234-256(1993)
WorldCat.org
18
Some improved bounds on the information rate of perfect secret sharing schemes. (English)
J. Cryptology 5, No.3, 153-166 (1992).
WorldCat.org
19
An interactive identification scheme based on discrete logarithms and factoring. (English)
J. Cryptology 5, No.1, 29-39 (1992).
WorldCat.org
20
first | previous | 1 21 41 | next | last

Result 1 to 20 of 50 total

Valid XHTML 1.0 Transitional Valid CSS!