Trusted Privacy Domains – Challenges for Trusted Computing in Privacy-Protecting Information Sharing (English)
- New search for: Löhr, Hans
- New search for: Sadeghi, Ahmad-Reza
- New search for: Vishik, Claire
- New search for: Winandy, Marcel
- New search for: Löhr, Hans
- New search for: Sadeghi, Ahmad-Reza
- New search for: Vishik, Claire
- New search for: Winandy, Marcel
In:
Information Security Practice and Experience
11
;
396-407
;
2009
- Article/Chapter (Book) / Electronic Resource
-
Title:Trusted Privacy Domains – Challenges for Trusted Computing in Privacy-Protecting Information Sharing
-
Contributors:Löhr, Hans ( author ) / Sadeghi, Ahmad-Reza ( author ) / Vishik, Claire ( author ) / Winandy, Marcel ( author )
-
Published in:Information Security Practice and Experience , 11 ; 396-407Lecture Notes in Computer Science ; 5451, 11 ; 396-407
-
Publisher:
- New search for: Springer Berlin Heidelberg
-
Place of publication:Berlin, Heidelberg
-
Publication date:2009-01-01
-
Size:12 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Type of media:Article/Chapter (Book)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents eBook
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Efficient and Provable Secure Ciphertext-Policy Attribute-Based Encryption SchemesIbraimi, Luan / Tang, Qiang / Hartel, Pieter / Jonker, Willem et al. | 2009
- 13
-
A Ciphertext-Policy Attribute-Based Encryption Scheme with Constant Ciphertext LengthEmura, Keita / Miyaji, Atsuko / Nomura, Akito / Omote, Kazumasa / Soshi, Masakazu et al. | 2009
- 24
-
RSA-Based Certificateless Public Key EncryptionLai, Junzuo / Deng, Robert H. / Liu, Shengli / Kou, Weidong et al. | 2009
- 35
-
Strongly Unforgeable ID-Based Signatures without Random OraclesSato, Chifumi / Okamoto, Takeshi / Okamoto, Eiji et al. | 2009
- 47
-
On the Security of a Certificate-Based Signature Scheme and Its Improvement with PairingsZhang, Jianhong et al. | 2009
- 59
-
An Empirical Investigation into the Security of Phone Features in SIP-Based VoIP SystemsZhang, Ruishan / Wang, Xinyuan / Yang, Xiaohui / Farley, Ryan / Jiang, Xuxian et al. | 2009
- 71
-
Reconstructing a Packed DLL Binary for Static AnalysisWang, Xianggen / Feng, Dengguo / Su, Purui et al. | 2009
- 83
-
Static Analysis of a Class of Memory Leaks in TrustedBSD MAC FrameworkWu, Xinsong / Zhou, Zhouyi / He, Yeping / Liang, Hongliang et al. | 2009
- 93
-
Efficient Concurrent n poly(logn)-Simulatable Argument of KnowledgeHuang, Guifang / Lin, Dongdai / Zhang, Yanshuo et al. | 2009
- 102
-
New Constructions for Reusable, Non-erasure and Universally Composable CommitmentsZhu, Huafei et al. | 2009
- 112
-
Certificateless Hybrid SigncryptionLi, Fagen / Shirase, Masaaki / Takagi, Tsuyoshi et al. | 2009
- 124
-
On Non-representable Secret Sharing MatroidsCheng, Qi / Yin, Yong / Xiao, Kun / Hsu, Ching-Fang et al. | 2009
- 136
-
A Novel Adaptive Watermarking Scheme Based on Human Visual System and Particle Swarm OptimizationZhu, Shaomin / Liu, Jianming et al. | 2009
- 147
-
Defending against the Pirate Evolution AttackJin, Hongxia / Lotspiech, Jeffrey et al. | 2009
- 159
-
Security Specification for Conversion Technologies of Heterogeneous DRM SystemsJo, Heasuk / Jeon, Woongryul / Lee, Yunho / Kim, Seungjoo / Won, Dongho et al. | 2009
- 171
-
Analysing Protocol ImplementationsHagalisletto, Anders Moen / Strand, Lars / Leister, Wolfgang / Groven, Arne-Kristian et al. | 2009
- 183
-
Measuring AnonymityCai, Xiaojuan / Gu, Yonggen et al. | 2009
- 195
-
A Hybrid E-Voting SchemePeng, Kun et al. | 2009
- 207
-
A Framework for Authenticated Key Exchange in the Standard ModelWu, Shuhua / Zhu, Yuefei et al. | 2009
- 219
-
Secret Handshake: Strong Anonymity Definition and ConstructionKawai, Yutaka / Yoneyama, Kazuki / Ohta, Kazuo et al. | 2009
- 230
-
An Extended Authentication and Key Agreement Protocol of UMTSFarhat, Farshid / Salimi, Somayeh / Salahi, Ahmad et al. | 2009
- 245
-
Hash-Based Key Management Schemes for MPEG4-FGSKarroumi, Mohamed / Massoudi, Ayoub et al. | 2009
- 257
-
Twister – A Framework for Secure and Fast Hash FunctionsFleischmann, Ewan / Forler, Christian / Gorski, Michael / Lucks, Stefan et al. | 2009
- 274
-
Preimage Attack on Hash Function RIPEMDWang, Gaoli / Wang, Shaohui et al. | 2009
- 285
-
Full Key-Recovery Attack on the HMAC/NMAC Based on 3 and 4-Pass HAVALYu, Hongbo / Wang, Xiaoyun et al. | 2009
- 298
-
Memoryless Related-Key Boomerang Attack on the Full Tiger Block CipherFleischmann, Ewan / Gorski, Michael / Lucks, Stefan et al. | 2009
- 310
-
Memoryless Related-Key Boomerang Attack on 39-Round SHACAL-2Fleischmann, Ewan / Gorski, Michael / Lucks, Stefan et al. | 2009
- 324
-
Some New Observations on the SMS4 Block Cipher in the Chinese WAPI StandardZhang, Wentao / Wu, Wenling / Feng, Dengguo / Su, Bozhan et al. | 2009
- 336
-
On the Correctness of an Approach against Side-Channel AttacksWang, Peng / Feng, Dengguo / Wu, Wenling / Zhang, Liting et al. | 2009
- 345
-
Ranking Attack Graphs with Graph Neural NetworksLu, Liang / Safavi-Naini, Rei / Hagenbuchner, Markus / Susilo, Willy / Horton, Jeffrey / Yong, Sweah Liang / Tsoi, Ah Chung et al. | 2009
- 360
-
Implementing IDS Management on Lock-KeeperCheng, Feng / Roschke, Sebastian / Meinel, Christoph et al. | 2009
- 372
-
Ensuring Dual Security Modes in RFID-Enabled Supply Chain SystemsCai, Shaoying / Li, Tieyan / Li, Yingjiu / Deng, Robert H. et al. | 2009
- 384
-
Achieving Better Privacy Protection in Wireless Sensor Networks Using Trusted ComputingYang, Yanjiang / Deng, Robert H. / Zhou, Jianying / Qiu, Ying et al. | 2009
- 396
-
Trusted Privacy Domains – Challenges for Trusted Computing in Privacy-Protecting Information SharingLöhr, Hans / Sadeghi, Ahmad-Reza / Vishik, Claire / Winandy, Marcel et al. | 2009