Implementation Aspects of Anonymous Credential Systems for Mobile Trusted Platforms
暂无分享,去创建一个
[1] Liqun Chen,et al. Lightweight Anonymous Authentication with TLS and DAA for Embedded Mobile Devices , 2010, ISC.
[2] Ors Yalcin,et al. Radio Frequency Identification: Security and Privacy Issues - 6th International Workshop, RFIDSec 2010, Istanbul, Turkey, June 8-9, 2010, Revised Selected Papers , 2010, RFIDSec.
[3] Liqun Chen,et al. On the Design and Implementation of an Efficient DAA Scheme , 2010, IACR Cryptol. ePrint Arch..
[4] Johannes Winter,et al. Implementation Aspects of Mobile and Embedded Trusted Computing , 2009, TRUST.
[5] Gene Tsudik,et al. Security and Privacy in Ad-hoc and Sensor Networks, Second European Workshop, ESAS 2005, Visegrad, Hungary, July 13-14, 2005, Revised Selected Papers , 2005, ESAS.
[6] Kurt Dietrich. An integrated architecture for trusted computing for java enabled embedded devices , 2007, STC '07.
[7] Mark Ryan,et al. Direct Anonymous Attestation (DAA): Ensuring Privacy with Corrupt Administrators , 2007, ESAS.
[8] Ernest F. Brickell,et al. Direct anonymous attestation , 2004, CCS '04.
[9] Jan Camenisch,et al. Anonymous credentials on a standard java card , 2009, CCS.
[10] Carlisle M. Adams,et al. X.509 Internet Public Key Infrastructure Online Certificate Status Protocol - OCSP , 1999, RFC.
[11] Aaron Weiss. Trusted computing , 2006, NTWK.
[12] Chris Mitchell. Trusted Computing (Professional Applications of Computing) (Professional Applications of Computing) , 2005 .
[13] Kurt Dietrich,et al. Anonymous Credentials for Java Enabled Platforms: A Performance Evaluation , 2009, INTRUST.
[14] Jan Camenisch,et al. Design and implementation of the idemix anonymous credential system , 2002, CCS '02.
[15] Carlisle M. Adams,et al. X.509 Internet Public Key Infrastructure Online Certificate Status Protocol - OCSP , 1999, RFC.
[16] Bart De Decker,et al. Communications and Multimedia Security , 2013, Lecture Notes in Computer Science.
[17] Kurt Dietrich. Anonymous Client Authentication for Transport Layer Security , 2010, Communications and Multimedia Security.
[18] Ingrid Verbauwhede,et al. Efficient implementation of anonymous credentials on Java Card smart cards , 2009, 2009 First IEEE International Workshop on Information Forensics and Security (WIFS).