Results 101 to 110 of about 7,266 (144)
Some of the next articles are maybe not open access.

Multi-domain Direct Anonymous Attestation Scheme from Pairings

International Conference on Network and System Security, 2015
In trusted computing, a Trusted Platform Module(TPM) is used to enhance the security of the platform. When the TPM proofs his identity to a remote verifier, the Direct Anonymous Attestation (DAA) method is adopted by the Trusted Computing Group(TCG) to provide anonymous authentication.
Li Yang, Jianfeng Ma, W. Wang, C. Cao
semanticscholar   +3 more sources

Design and Analysis on Direct Anonymous Attestation for Security Chip [PDF]

open access: possible2011 2nd International Symposium on Intelligence Information Processing and Trusted Computing, 2011
Direct Anonymous Attestation (DAA) is an anonymous protocol designed for TPM/TCM or other embedding devices. Recently, DAA schemes based on the pairing continues to advance rapidly, but it has a certain problems to put the scheme into application. This paper focuses on the practicability and feasibility for the design of the pairing DAA protocol and ...
XiaoBo Chu, Yu Qin, QiuXin Wu
openaire   +1 more source

A new improved direct anonymous attestation scheme with enhanced anonymity

2011 Second International Conference on Mechanic Automation and Control Engineering, 2011
The Rudolph attacks, dictionary attacks in general password-based encrypted mechanism and replay attacks were analyzed in this paper. A new improved DAA scheme was proposed, it based on a bilinear pairing mechanism and Frequency Certificates, improved the JOIN and SIGNING protocol, and added a Trusted Synergic Third Party.
Wei Zhang   +3 more
openaire   +2 more sources

Mdaak: A Flexible and Efficient Framework for Direct Anonymous Attestation on Mobile Devices

International Conference on Information, Communications and Signal Processing, 2014
In this paper, we investigate how to implement Direct Anonymous Attestation DAA on mobile devices, whose processing and storage capabilities are limited. We propose a generic framework providing a secure and efficient DAA functionality based on ARM TrustZone.
Qianying Zhang   +4 more
semanticscholar   +3 more sources

Revocation of Direct Anonymous Attestation

2011
Direct Anonymous Attestation (DAA) is a special type of anonymous digital signatures, used by the Trusted Computing Group (TCG) for the purpose of computer platform attestation whilst preserving platform anonymity. Like any other anonymous cryptographic primitives, how to efficiently revoke an existing member who is no longer legitimate, is an ...
Liqun Chen, Jiangtao Li
openaire   +2 more sources

Direct Anonymous Attestations with Dependent Basename Opening

2014
We introduce a new privacy-friendly cryptographic primitive we call Direct Anonymous Attestations with Dependent Basename Opening (DAA-DBO). Such a primitive is a Direct Anonymous Attestation in which the anonymity can be revoked only if a specific authority, called the admitter, allowed to revoke the DAA signatures that include a specific basename. We
Desmoulins, Nicolas   +3 more
openaire   +2 more sources

A Time-and-Times-Limited Strong Direct Anonymous Attestation Scheme

2009 International Conference on Business Intelligence and Financial Engineering, 2009
Direct Anonymous Attestation (DAA) has been adopted in Trusted Platform Module v 1.2 (TPM v1.2) Specification, described by Trusted Computing Group (TCG). It intends to solve the trusted platform attestation and the platform privacy protection. In DAA, the certificate can be used repeatedly and this will provide the opportunities for rogue TPMs to ...
Jing Shao   +3 more
openaire   +2 more sources

A Direct Anonymous Attestation Protocol Based on Hierarchical Group Signature

2009 International Conference on Computational Science and Engineering, 2009
Virtualization makes virtual machines with a wide range of security requirements run simultaneously on the same commodity hardware. Direct Anonymous Attestation (DAA) for virtual machine is a cryptographic mechanism that enables remote attestation of virtual machine instances ( VMIs ) while preserving privacy under the user’s control.
Li-na Wang   +3 more
openaire   +1 more source

A Trusted Authentication Scheme for Wireless Networks Using Direct Anonymous Attestation

2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012
Not only user identities but also the platforms need to be authenticated in wireless networks under trusted computing environment. Based on direct anonymous attestation of trusted computing, a wireless anonymous authentication scheme is proposed, the platform of the mobile node was verified by the foreign network agent and the identity of the mobile ...
Li Yang   +3 more
openaire   +2 more sources

Radiation therapy‐associated toxicity: Etiology, management, and prevention

Ca-A Cancer Journal for Clinicians, 2021
Kyle Wang
exaly  

Home - About - Disclaimer - Privacy