Sciweavers

3299 search results - page 51 / 660
» Privacy and Trusted Computing
Sort
View
SP
2008
IEEE
118views Security Privacy» more  SP 2008»
13 years 8 months ago
Cheaper adjoints by reversing address computations
Laurent Hascoët, Jean Utke, Uwe Naumann
CSREASAM
2010
13 years 3 months ago
Security Challenges in Cloud Computing
Levent Ertaul, S. Singhal, Gökay Saldamli
CHES
2009
Springer
140views Cryptology» more  CHES 2009»
14 years 9 months ago
On Tamper-Resistance from a Theoretical Viewpoint
Tamper-proof devices are pretty powerful. They can be used to have better security in applications. In this work we observe that they can also be maliciously used in order to defea...
Paulo Mateus, Serge Vaudenay
CCS
2004
ACM
14 years 2 months ago
Direct anonymous attestation
This paper describes the direct anonymous attestation scheme (DAA). This scheme was adopted by the Trusted Computing Group as the method for remote authentication of a hardware mo...
Ernest F. Brickell, Jan Camenisch, Liqun Chen