Secure Embedded Platform with Advanced Process Isolation and Anonymity Capabilities
暂无分享,去创建一个
Marc-Michael Bergfeld | Holger Bock | Roderick Bloem | Johannes Winter | Stephan Spitz | Kurt Dietrich | Gregory Conti | Jan Blonk | Matthias Junk | Florian Schreiner
[1] Amit Sahai,et al. Ring Signatures of Sub-linear Size Without Random Oracles , 2007, ICALP.
[2] Aggelos Kiayias,et al. Anonymous Identification in Ad Hoc Groups , 2004, EUROCRYPT.
[3] Hovav Shacham,et al. Short Group Signatures , 2004, CRYPTO.
[4] Ulrich Ultes-Nitsche,et al. Extensible Authentication Protocol Method for Trusted Computing Groups (TCG) Trusted Platform Modules , 2009 .
[5] Masayuki Abe,et al. 1-out-of-n Signatures from a Variety of Keys , 2002, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[6] Pairing based signature schemes , 2004 .
[7] Ben Lynn,et al. On the implementation of pairing-based cryptosystems , 2007 .
[8] C. P. Schnorr,et al. Efficient Identification and Signatures for Smart Cards (Abstract) , 1989, EUROCRYPT.
[9] Yael Tauman Kalai,et al. How to Leak a Secret: Theory and Applications of Ring Signatures , 2001, Essays in Memory of Shimon Even.
[10] Philippe Fouquart,et al. ASN.1 Communication Between Heterogeneous Systems , 2000 .
[11] David E. Williams,et al. Virtualization with Xen: Including XenEnterprise, XenServer, and XenExpress , 2007 .
[12] Ingrid Verbauwhede,et al. Efficient implementation of anonymous credentials on Java Card smart cards , 2009, 2009 First IEEE International Workshop on Information Forensics and Security (WIFS).
[13] Jan Camenisch,et al. Anonymous credentials on a standard java card , 2009, CCS.
[14] Tommy Färnqvist. Number Theory Meets Cache Locality – Efficient Implementation of a Small Prime FFT for the GNU Multiple Precision Arithmetic Library , 2005 .
[15] Kurt Dietrich,et al. Anonymous Credentials for Java Enabled Platforms: A Performance Evaluation , 2009, INTRUST.