Sciweavers

3299 search results - page 3 / 660
» Privacy and Trusted Computing
Sort
View
ESAS
2007
Springer
14 years 9 days ago
Direct Anonymous Attestation (DAA): Ensuring Privacy with Corrupt Administrators
The Direct Anonymous Attestation (DAA) scheme provides a means for remotely authenticating a trusted platform whilst preserving the user’s privacy. The protocol has been adopted ...
Ben Smyth, Mark Ryan, Liqun Chen
JCP
2007
121views more  JCP 2007»
13 years 6 months ago
p-Trust: A New Model of Trust to Allow Finer Control Over Privacy in Peer-to-Peer Framework
— Every time a user conducts an electronic transaction over the Internet a wealth of personal information is revealed, either voluntarily or involuntarily. This causes serious br...
Sudip Chakraborty, Indrajit Ray
SAC
2004
ACM
13 years 11 months ago
Trust enhanced ubiquitous payment without too much privacy loss
Computational models of trust have been proposed for use in ubicomp environments for deciding whether to allow customers to pay with an e-purse or not. In order to build trust in ...
Jean-Marc Seigneur, Christian Damsgaard Jensen
WPES
2005
ACM
13 years 11 months ago
Privacy for RFID through trusted computing
Radio Frequency Identification (RFID) technology raises significant privacy issues because it enables tracking of items and people possibly without their knowledge or consent. O...
David Molnar, Andrea Soppera, David Wagner
TRUST
2010
Springer
13 years 11 months ago
µTSS - A Simplified Trusted Software Stack
Christian Stüble, Anoosheh Zaerin