Back to Results
First PageMeta Content
Direct Anonymous Attestation / Internet privacy / Trusted computing / Trusted Platform Module / Cloud computing / Cryptography / Computer security / Computing


Direct Anonymous Attestation: Enhancing Cloud Service User Privacy Ulrich Greveler, Benjamin Justus, and Dennis Loehr Computer Security Lab M¨ unster University of Applied Sciences
Add to Reading List

Document Date: 2011-09-26 03:53:20


Open Document

File Size: 716,04 KB

Share Result on Facebook

City

Privacy / New York / /

Company

Google / The Trusted Computing Group / R. (eds.) TRUST / Trust Computing Group / EMC / /

Country

Sudan / /

/

IndustryTerm

search content / efficient solution / technology deployment / sub-protocols / identity management / hardware/software / geo-location tool / non-linkable applications / linkable applications / web browser / designated application / linked-applications / more personal data / web searches/browsing / search history / prototype hardware / hardware chip / security technologies / Web Album / application / Google collect more / cloud infrastructure / application involving software download/upgrade / possible solution / Typical non-linkable applications / social networking / Internet-based services / sign protocol / computing / credential systems / cloud services / /

OperatingSystem

Chrome Operating System / /

Organization

TPM’s AIK / Conclusion Cloud Service / University of Applied Sciences D-48565 Steinfurt / European Commission / European Union / /

Person

Rabin / Dennis Loehr / Benjamin Justus / /

Position

Private Information Retrieval / /

Product

Latitude 1.2 Privacy Concerns Cloud Services / Account Suspension / /

ProvinceOrState

Nevada / New York / California / /

PublishedMedium

Theory of Computing / /

Technology

DAA protocol / 2.2 DAA Sign Protocol The sign protocol / hardware chip / 2.3 Variable Anonymity The DAA protocol / private key / secret key / Operating System / Public Key Encryption / encryption / security technologies / cellular telephone / Cryptography / two sub-protocols / sign protocol / DAA Sign protocol / public key / Efficient Protocols / http / 2.1 DAA Join Protocol The Join protocol / DAA Join protocol / 2.4 Rogue Tagging The DAA protocol / 2 DAA Protocol / /

URL

http /

SocialTag