Back to Results
First PageMeta Content
Trusted computing / Cryptography / File sharing networks / Internet privacy / Direct Anonymous Attestation / Peer-to-peer computing / Trusted Platform Module / Peer-to-peer / Social peer-to-peer processes / Computer security / Computing / Concurrent computing


Trusted Computing: Providing Security for Peer-to-Peer Networks Shane Balfe, Amit D. Lakhani and Kenneth G. Paterson, Information Security Group, Royal Holloway, University of London, United Kingdom. {S.Balfe,Amit.Lakhan
Add to Reading List

Document Date: 2005-06-23 08:33:02


Open Document

File Size: 137,86 KB

Share Result on Facebook

City

Saratoga / Bristol / /

Company

eBay / pseudonym NV / ACM Press / P2P Networks / Hewlett-Packard Laboratories / Intel / Microsoft / Trusted Computing / Trusted Computing Group / /

Country

United Kingdom / /

/

Event

FDA Phase / M&A / /

Facility

Building Secure Channels / Building Security Services / University of London / /

IndustryTerm

nonrepudiation / client-server systems / platform manufacturer / secure channels / tamperresistant security hardware device / authenticated key establishment protocol / efficient protocols / authentication / e-commerce / desired security services / generic security services / symmetric encryption algorithms / suitable / integrity services / wider security services / distributed security infrastructure / peer software / secure communications / possible solution / security services / e - commerce / secure operating systems / computing / internet identity subversion / on-line auction systems / peer software configuration / potential security services / particular network / attestation protocol / to-peer networks / pseudonymous authentication scheme / accountability services / /

Organization

International Organisation for Standardization / effectively police / United Nations / University of London / /

Person

Amit D. Lakhani / Shane Balfe / /

Position

editor / representative / /

Product

Trusted Computing Whilst / platform / /

Technology

DAA protocol / DAA algorithms / Peer-to-Peer / private key / operating system / SSL / operating systems / public key / efficient protocols / symmetric encryption algorithms / attestation protocol / peer- to-peer / DAA-Verify algorithm / DAA-Signing algorithm / P2P system / authenticated key establishment protocol / P2P technology / /

URL

http /

SocialTag