Results 101 to 110 of about 7,266 (144)
Some of the next articles are maybe not open access.
Multi-domain Direct Anonymous Attestation Scheme from Pairings
International Conference on Network and System Security, 2015In trusted computing, a Trusted Platform Module(TPM) is used to enhance the security of the platform. When the TPM proofs his identity to a remote verifier, the Direct Anonymous Attestation (DAA) method is adopted by the Trusted Computing Group(TCG) to provide anonymous authentication.
Li Yang, Jianfeng Ma, W. Wang, C. Cao
semanticscholar +3 more sources
Design and Analysis on Direct Anonymous Attestation for Security Chip [PDF]
Direct Anonymous Attestation (DAA) is an anonymous protocol designed for TPM/TCM or other embedding devices. Recently, DAA schemes based on the pairing continues to advance rapidly, but it has a certain problems to put the scheme into application. This paper focuses on the practicability and feasibility for the design of the pairing DAA protocol and ...
XiaoBo Chu, Yu Qin, QiuXin Wu
openaire +1 more source
A new improved direct anonymous attestation scheme with enhanced anonymity
2011 Second International Conference on Mechanic Automation and Control Engineering, 2011The Rudolph attacks, dictionary attacks in general password-based encrypted mechanism and replay attacks were analyzed in this paper. A new improved DAA scheme was proposed, it based on a bilinear pairing mechanism and Frequency Certificates, improved the JOIN and SIGNING protocol, and added a Trusted Synergic Third Party.
Wei Zhang+3 more
openaire +2 more sources
Mdaak: A Flexible and Efficient Framework for Direct Anonymous Attestation on Mobile Devices
International Conference on Information, Communications and Signal Processing, 2014In this paper, we investigate how to implement Direct Anonymous Attestation DAA on mobile devices, whose processing and storage capabilities are limited. We propose a generic framework providing a secure and efficient DAA functionality based on ARM TrustZone.
Qianying Zhang+4 more
semanticscholar +3 more sources
Revocation of Direct Anonymous Attestation
2011Direct Anonymous Attestation (DAA) is a special type of anonymous digital signatures, used by the Trusted Computing Group (TCG) for the purpose of computer platform attestation whilst preserving platform anonymity. Like any other anonymous cryptographic primitives, how to efficiently revoke an existing member who is no longer legitimate, is an ...
Liqun Chen, Jiangtao Li
openaire +2 more sources
Direct Anonymous Attestations with Dependent Basename Opening
2014We introduce a new privacy-friendly cryptographic primitive we call Direct Anonymous Attestations with Dependent Basename Opening (DAA-DBO). Such a primitive is a Direct Anonymous Attestation in which the anonymity can be revoked only if a specific authority, called the admitter, allowed to revoke the DAA signatures that include a specific basename. We
Desmoulins, Nicolas+3 more
openaire +2 more sources
A Time-and-Times-Limited Strong Direct Anonymous Attestation Scheme
2009 International Conference on Business Intelligence and Financial Engineering, 2009Direct Anonymous Attestation (DAA) has been adopted in Trusted Platform Module v 1.2 (TPM v1.2) Specification, described by Trusted Computing Group (TCG). It intends to solve the trusted platform attestation and the platform privacy protection. In DAA, the certificate can be used repeatedly and this will provide the opportunities for rogue TPMs to ...
Jing Shao+3 more
openaire +2 more sources
A Direct Anonymous Attestation Protocol Based on Hierarchical Group Signature
2009 International Conference on Computational Science and Engineering, 2009Virtualization makes virtual machines with a wide range of security requirements run simultaneously on the same commodity hardware. Direct Anonymous Attestation (DAA) for virtual machine is a cryptographic mechanism that enables remote attestation of virtual machine instances ( VMIs ) while preserving privacy under the user’s control.
Li-na Wang+3 more
openaire +1 more source
A Trusted Authentication Scheme for Wireless Networks Using Direct Anonymous Attestation
2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012Not only user identities but also the platforms need to be authenticated in wireless networks under trusted computing environment. Based on direct anonymous attestation of trusted computing, a wireless anonymous authentication scheme is proposed, the platform of the mobile node was verified by the foreign network agent and the identity of the mobile ...
Li Yang+3 more
openaire +2 more sources
Radiation therapy‐associated toxicity: Etiology, management, and prevention
Ca-A Cancer Journal for Clinicians, 2021Kyle Wang
exaly