Results 21 to 30 of about 7,266 (144)

Direct Anonymous Attestation with Efficient Verifier-Local Revocation for Subscription System [PDF]

open access: bronzeIACR Cryptology ePrint Archive, 2018
For a computing platform that is compliant with the Trusted Platform Module (TPM) standard, direct anonymous attestation (DAA) is an appropriate cryptographic protocol for realizing an anonymous subscription system.
Vireshwar Kumar   +7 more
openalex   +2 more sources

A Lightweight Inter-domain Direct Anonymous Attestation Scheme for Machine-to-Machine Networks [PDF]

open access: goldInternational Conference on Cloud Computing, 2013
As an important application mode of Internet of Things, Machine-to-Machine (M2M) networks have gained more and more concerns. However, the security problems such as privacy protection and platform authentication in M2M networks are not fulfilled the ...
Liquan Chen   +3 more
openalex   +2 more sources

Improved direct anonymous attestation scheme for mobile computing platforms

open access: yesTongxin xuebao, 2013
The security flaws of a direct anonymous attestation scheme proposed by Ge,et al.Were analyzed,and the re-sult shows that the authentication protocol of the scheme is vulnerable to reply attacks and platform masquerade attacks when being used for remote ...
Li YANG   +3 more
doaj   +3 more sources

Covert Identity Information in Direct Anonymous Attestation (DAA) [PDF]

open access: bronze, 2007
Direct anonymous attestation (DAA) is a practical and efficient protocol for authenticated attestation with satisfaction of strong privacy requirements. This recently developed protocol is already adopted by the Trusted Computing Group and included in the standardized trusted platform module TPM.
Carsten Rudolph
openalex   +3 more sources

On a Possible Privacy Flaw in Direct Anonymous Attestation (DAA) [PDF]

open access: closed, 2008
A possible privacy flaw in the TCG implementation of the Direct Anonymous Attestation (DAA) protocol has recently been discovered by Rudolph. This flaw allows a DAA Issuer to covertly include identifying information within DAA Certificates, enabling a colluding DAA Issuer and one or more verifiers to link and uniquely identify users, compromising user ...
Adrian Leung   +2 more
openalex   +12 more sources

An Improved Direct Anonymous Attestation Scheme for M2M Networks

open access: goldProcedia Engineering, 2011
AbstractThe remote anonymous trusted authentication of M2M equipments is a key problem in Internet of Things system. The Direct Anonymous Attestation (DAA) protocol had been adopted by TCG to implement the attestation of the trusted platform. Limited by the deficient computing and storing resources of most embedded devices, a new improved DAA (I-DAA ...
HE Ying-ying, Liquan Chen, Lingling Wang
openalex   +3 more sources

Direct Anonymous Attestation: Enhancing Cloud Service User Privacy [PDF]

open access: bronze, 2011
We introduce a privacy enhancing cloud service architecture based on the Direct Anonymous Attestation (DAA) scheme. In order to protect user data, the architecture provides cloud users with the abilities of controlling the extent of data sharing among their service accounts.
Ulrich Greveler   +2 more
openalex   +3 more sources

VeloCash: Anonymous Decentralized Probabilistic Micropayments With Transferability

open access: yesIEEE Access, 2022
Micropayments are one of the challenges in cryptocurrencies. Micropayments on the blockchain have the problem that the fee is high for the transfer amount.
Taisei Takahashi   +2 more
doaj   +1 more source

The Role of Non-Positional Arithmetic on Efficient Emerging Cryptographic Algorithms

open access: yesIEEE Access, 2020
Number representation systems establish ways in which numbers are mapped to computer architectures, and how operations over the numbers are translated into computer instructions.
Paulo Martins, Leonel Sousa
doaj   +1 more source

Home - About - Disclaimer - Privacy