History


Please fill in your query. A complete syntax description you will find on the General Help page.
first | previous | 1 21 41 | next | last

Result 1 to 20 of 51 total

Recent advances and existing research questions in platform security. (English)
Safavi-Naini, Reihaneh (ed.) et al., Advances in cryptology ‒ CRYPTO 2012. 32nd annual cryptology conference, Santa Barbara, CA, USA, August 19‒23, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-32008-8/pbk). Lecture Notes in Computer Science 7417, 570 (2012).
WorldCat.org
1
Enhanced Privacy ID: A Direct Anonymous Attestation Scheme with Enhanced Revocation Capabilities. (English)
IEEE Trans. Dependable Sec. Comput.IEEE Trans. Dependable Sec. Comput. 9, N0. 3, 345-360(2012)
WorldCat.org
2
A Static Diffie-Hellman Attack on Several Direct Anonymous Attestation Schemes. (English)
INTRUST, 95-111(2012)
WorldCat.org
3
’MotorcycleSim’: An Evaluation of Rider Interaction with an Innovative Motorcycle Simulator. (English)
Comput. J.Comput. J. 54, N0. 7, 1010-1025(2011)
WorldCat.org
4
A (Corrected) DAA Scheme Using Batch Proof and Verification. (English)
INTRUST, 304-337(2011)
WorldCat.org
5
Enhanced privacy ID from bilinear pairing for hardware authentication and attestation. (English)
IJIPSIIJIPSI 1, N0. 1, 3-33(2011)
WorldCat.org
6
A pairing-based DAA scheme further reducing TPM resources. (English)
Acquisti, Alessandro (ed.) et al., Trust and trustworthy computing. Third international conference, TRUST 2010, Berlin, Germany, June 21‒23, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-13868-3/pbk). Lecture Notes in Computer Science 6101, 181-195 (2010).
WorldCat.org
7
Enhanced Privacy ID from Bilinear Pairing for Hardware Authentication and Attestation. (English)
SocialCom/PASSAT, 768-775(2010)
WorldCat.org
8
Simplified security notions of direct anonymous attestation and a concrete scheme from pairings. (English)
Int. J. Inf. Secur. 8, No. 5, 315-330 (2009).
WorldCat.org
9
A new direct anonymous attestation scheme from bilinear maps. (English)
Lipp, Peter (ed.) et al., Trusted computing ‒ challenges and applications. First international conference on trusted computing and trust in information technologies, TRUST 2008, Villach, Austria, March 11‒12, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-68978-2/pbk). Lecture Notes in Computer Science 4968, 166-178 (2008).
WorldCat.org
10
A vision for platform security. (English)
Oswald, Elisabeth (ed.) et al., Cryptographic hardware and embedded systems ‒ CHES 2008. 10th international workshop, Washington, D.C., USA, August 10‒13, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-85052-6/pbk). Lecture Notes in Computer Science 5154, 444 (2008).
WorldCat.org
11
Enhanced privacy id: a direct anonymous attestation scheme with enhanced revocation capabilities. (English)
WPES, 21-30(2007)
WorldCat.org
12
Direct anonymous attestation. (English)
ACM Conference on Computer and Communications Security, 132-145(2004)
WorldCat.org
13
Sharing block ciphers. (English)
Dawson, Ed (ed.) et al., Information security and privacy. 5th Australasian conference, ACISP 2000, Brisbane, Australia, July 10-12, 2000. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1841, 457-470 (2000).
WorldCat.org
14
Design validations for discrete logarithm based signature schemes. (English)
Imai, Hideki (ed.) et al., Public key cryptography. 3rd international workshop on Practice and theory in public key cryptosystems, PKC 2000, Melbourne, Victoria, Australia, January 18-20, 2000. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1751, 276-292 (2000).
WorldCat.org
15
Trustee-based tracing extensions to anonymous cash and the making of anonymous change. (English)
Clarkson, K. (ed.), Proceedings of the 6th annual ACM-SIAM symposium on discrete algorithms, San Francisco, CA, USA, January 22-24, 1995. Philadelphia, PA: SIAM. 457-466 (1995).
WorldCat.org
16
Fast exponentiation with precomputation. (Extended abstract). (English)
Rueppel, Rainer A. (ed.), Advances in cryptology ‒ EUROCRYPT ’92. Workshop on the theory and applications of cryptographic techniques, Balatonfüred, Hungary, May 24-28, 1992. Proceedings. Berlin: Springer- Verlag. Lect. Notes Comput. Sci. 658, 200-207 (1993).
WorldCat.org
17
Advances in Cryptology - CRYPTO ’92. 12th annual international cryptology conference, Santa Barbara, CA, USA, August 16-20, 1992. Proceedings. (English)
Lecture Notes in Computer Science. 740. Berlin: Springer-Verlag. X, 593 p. DM 114.00; öS 889.20; sFr 114.00 /sc (1993).
WorldCat.org
18
The Number of Distinct Subset Sums of a Finite Set of Vectors. (English)
J. Comb. Theory, Ser. AJ. Comb. Theory, Ser. A 63, N0. 2, 234-256(1993)
WorldCat.org
19
Some improved bounds on the information rate of perfect secret sharing schemes. (English)
J. Cryptology 5, No.3, 153-166 (1992).
WorldCat.org
20
first | previous | 1 21 41 | next | last

Result 1 to 20 of 51 total

Valid XHTML 1.0 Transitional Valid CSS!