Back to Results
First PageMeta Content
Trusted Computing / Group signature / Digital signature / Anonymity / Public key certificate / Certificate authority / Digital credential / Direct Anonymous Attestation / Cryptography / Public-key cryptography / Key management


figures/spendorsementRATE.eps
Add to Reading List

Document Date: 2014-05-29 15:38:01


Open Document

File Size: 262,13 KB

Share Result on Facebook

City

Matching / /

Company

IBM / SP. / /

/

Event

Business Partnership / /

Facility

Schwartz David Brumley Jonathan M. McCune Carnegie Mellon University / /

IndustryTerm

anonymity protocols / secure protocols / software module / anonymous communication protocols / verification algorithm / trustworthy computing mechanism / breach protocol / Internet services / legitimate trusted computing device / platform security technologies / subjective judging protocols / anonymity systems / trusted computing identifier / secure channel protocol / software component / user software / whistle-blowing services / trusted computing properties / contractual anonymity protocol / anonymous authentication protocol / secure channel protocols / trusted computing device / registration protocol / trusted computing device endorsement certificate / recent systems / accountability server / trusted computing platforms / trusted computing / anonymous communication protocol / commodity operating systems / computing / trusted computing implementations / trusted computing base / signature / trusted computing-enabled isolation / Subjective-based systems / /

OperatingSystem

XP / /

Organization

Carnegie Mellon University / /

Person

IOLA TION / A LLOWED / V / David Brumley Jonathan / /

Position

token RT / manager / RT / group manager / user revocation tokens RT / straight-forward / Private / judge / /

ProgrammingLanguage

R / K / /

ProvinceOrState

NU / /

Technology

Virtual Machine / U-AS protocol / anonymous communication protocols / Setup symmetric encryption / Previous subjective judging protocols / EN algorithm / key binding protocol / Efficiency The protocol / private key / ERIFY algorithm / secret key / operating system / SSL / operating systems / registration protocol / encryption / using platform security technologies / key-binding protocol / Previous anonymity protocols / cryptography / contract Breach protocol / secure channel protocol / contractual anonymity protocol / public key / RECAP protocol / secure channel protocols / verification algorithm / anonymous communication protocol / U-AS registration protocol / breach protocol / anonymous authentication protocol / IGN algorithm / 4.2 Protocol Phases The RECAP protocol / conceivably be enforced using threshold cryptography / /

SocialTag