G. kG / Cambridge University Press / Australian Computer Society Inc. / NCSU Secure Open Systems / Intel / Shamus Software / /
Country
United States / Australia / United Kingdom / / /
Facility
MIRACL library / Computer Science North Carolina State University / /
Holiday
Assumption / /
IndustryTerm
forward secure and aggregate audit / generation algorithm / tamper resistant hardware / communications security / virtual computing cloud / aggregate signature verification algorithm / e-research / continuous real-time log verifiers / possible solutions / update algorithm / large distributed systems / implantable medical devices / aggregate signature generation algorithm / virtual computing clouds / wireless sensors / real-life applications / computer systems / encrypted search / secure audit / er algorithm / continuous end-to-end real-time communication / actual algorithms / tamper-resistant hardware / secure audit logging applications / implantable devices / bug-free tamper-resistant hardware / computing / security in computer systems / computer communications / continuous real-time communication / using a bug-free tamper-resistant hardware / /
NaturalFeature
K. Fall / /
OperatingSystem
Windows XP / /
Organization
Cambridge University / U.S. Army Research Office / U.S. Government / U.S. National Science Foundation / Peng Ning Department of Computer Science North Carolina State University Raleigh / USENIX Association / Australian Computer Society / Trusted Third Party / /
Person
Bt / Attila A. Yavuz / /
Position
low logger / model / the same logger / BlindAggregate-Forward / logger / Blind-Aggregate-Forward / /