Sciweavers

8655 search results - page 389 / 1731
» Challenges for Trusted Computing
Sort
View
FC
2009
Springer
118views Cryptology» more  FC 2009»
15 years 10 months ago
Cryptographic Combinatorial Clock-Proxy Auctions
We present a cryptographic protocol for conducting efficient, provably correct and secrecy-preserving combinatorial clock-proxy auctions. The “clock phase” functions as a trust...
David C. Parkes, Michael O. Rabin, Christopher Tho...
FSTTCS
2009
Springer
15 years 10 months ago
Simulation based security in the applied pi calculus
We present a symbolic framework for refinement and composition of security protocols. ework uses the notion of ideal functionalities. These are abstract systems which are secure b...
Stéphanie Delaune, Steve Kremer, Olivier Pe...
ICDCS
2008
IEEE
15 years 10 months ago
Strong WORM
We introduce a Write-Once Read-Many (WORM) storage system providing strong assurances of data retention and compliant migration, by leveraging trusted secure hardware in close dat...
Radu Sion
118
Voted
ICDCS
2007
IEEE
15 years 10 months ago
Combating Double-Spending Using Cooperative P2P Systems
An electronic cash system allows users to withdraw coins, represented as bit strings, from a bank or broker, and spend those coins anonymously at participating merchants, so that ...
Ivan Osipkov, Eugene Y. Vasserman, Nicholas Hopper...
ICPADS
2007
IEEE
15 years 10 months ago
Finding candidate spots for replica servers based on demand fluctuation
Many service providers distribute various kinds of content over the Internet. They often use replica servers to provide stable service. To position them appropriately, service pro...
Masato Asahara, Akio Shimada, Hiroshi Yamada, Kenj...