Direct Anonymous Attestation (DAA): An implementation and security analysis
暂无分享,去创建一个
[1] Josh Benaloh,et al. Receipt-free secret-ballot elections (extended abstract) , 1994, STOC '94.
[2] Roger M. Needham,et al. Using encryption for authentication in large networks of computers , 1978, CACM.
[3] Amos Fiat,et al. Zero-knowledge proofs of identity , 1987, Journal of Cryptology.
[4] Mihir Bellare,et al. Fast Batch Verification for Modular Exponentiation and Digital Signatures , 1998, IACR Cryptol. ePrint Arch..
[5] Ernest F. Brickell,et al. Gradual and Verifiable Release of a Secret , 1987, CRYPTO.
[6] Mark Ryan,et al. Analysis of an Electronic Voting Protocol in the Applied Pi Calculus , 2005, ESOP.
[7] Gavin Lowe,et al. Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR , 1996, Softw. Concepts Tools.
[8] David Chaum,et al. Demonstrating Possession of a Discrete Logarithm Without Revealing It , 1986, CRYPTO.
[9] Tatsuaki Okamoto,et al. Receipt-Free Electronic Voting Schemes for Large Scale Elections , 1997, Security Protocols Workshop.
[10] Ernest F. Brickell,et al. Direct anonymous attestation , 2004, CCS '04.
[11] Amos Fiat,et al. How to Prove Yourself: Practical Solutions to Identification and Signature Problems , 1986, CRYPTO.
[12] Nancy A. Lynch,et al. Cryptographic protocols , 1982, STOC '82.
[13] Ronald Cramer,et al. Improved Privacy in Wallets with Observers (Extended Abstract) , 1994, EUROCRYPT.
[14] Kazue Sako,et al. Efficient Receipt-Free Voting Based on Homomorphic Encryption , 2000, EUROCRYPT.
[15] David Chaum,et al. An Improved Protocol for Demonstrating Possession of Discrete Logarithms and Some Generalizations , 1987, EUROCRYPT.
[16] Tatsuaki Okamoto,et al. An electronic voting scheme , 1996, IFIP World Conference on IT Tools.
[17] Sebastian Mödersheim,et al. The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications , 2005, CAV.
[18] Jason Weiss,et al. Java Cryptography Extensions: Practical Guide for Programmers , 2004 .
[19] Martín Abadi,et al. Mobile values, new names, and secure communication , 2001, POPL '01.
[20] Jan Camenisch,et al. Separability and Efficiency for Generic Group Signature Schemes , 1999, CRYPTO.
[21] Tatsuo Tanaka. Possible Economic Consequences of Digital Cash , 1996, First Monday.
[22] Gary Cornell,et al. Core Java(TM) 2, Volume II--Advanced Features (7th Edition) , 2004 .
[23] David Chaum,et al. Zero-Knowledge Undeniable Signatures , 1991, EUROCRYPT.
[24] Bruno Blanchet,et al. An efficient cryptographic protocol verifier based on prolog rules , 2001, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001..
[25] Danny Dolev,et al. On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).
[26] Jan Camenisch,et al. A Signature Scheme with Efficient Protocols , 2002, SCN.
[27] Manuel Blum,et al. A Simple Unpredictable Pseudo-Random Number Generator , 1986, SIAM J. Comput..
[28] Silvio Micali,et al. The knowledge complexity of interactive proof-systems , 1985, STOC '85.
[29] Jan Camenisch,et al. A Group Signature Scheme with Improved Efficiency , 1998, ASIACRYPT.
[30] David Hook. Beginning Cryptography with Java , 2005 .
[31] Silvio Micali,et al. Efficient, Perfect Random Number Generators , 1988, CRYPTO.
[32] Anna Lysyanskaya,et al. Signature schemes and applications to cryptographic protocol design , 2002 .
[33] Boby George,et al. An initial investigation of test driven development in industry , 2003, SAC '03.
[34] G. Denker,et al. CAPSL integrated protocol environment , 2000, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.
[35] Catherine A. Meadows,et al. Applying Formal Methods to the Analysis of a Key Management Protocol , 1992, J. Comput. Secur..
[36] Michael K. Reiter,et al. Crowds: anonymity for Web transactions , 1998, TSEC.
[37] Gary Cornell,et al. Core Java 2, Volume 1: Fundamentals (7th Edition) , 2004 .
[38] Laurie A. Williams,et al. Assessing test-driven development at IBM , 2003, 25th International Conference on Software Engineering, 2003. Proceedings..
[39] Martín Abadi,et al. A logic of authentication , 1990, TOCS.
[40] Atsushi Fujioka,et al. A Practical Secret Voting Scheme for Large Scale Elections , 1992, AUSCRYPT.
[41] Paul F. Syverson,et al. Anonymous connections and onion routing , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).
[42] Fred P. Brooks,et al. The Mythical Man-Month , 1975, Reliable Software.
[43] Gavin Lowe,et al. An Attack on the Needham-Schroeder Public-Key Authentication Protocol , 1995, Inf. Process. Lett..
[44] A. Pfitzmann,et al. Anonymity, Unlinkability, Unobservability, Pseudonymity, and Identity Management – A Consolidated Proposal for Terminology , 2002 .
[45] Silvio Micali,et al. Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systems , 1991, JACM.
[46] Fabrice Boudot,et al. Efficient Proofs that a Committed Number Lies in an Interval , 2000, EUROCRYPT.
[47] Andreas Pfitzmann,et al. Anonymity, Unobservability, and Pseudonymity - A Proposal for Terminology , 2000, Workshop on Design Issues in Anonymity and Unobservability.
[48] Jan Camenisch,et al. Efficient Group Signature Schemes for Large Groups (Extended Abstract) , 1997, CRYPTO.