More efficient secure function evaluation using tiny trusted third parties

A Iliev, S Smith - 2005 - digitalcommons.dartmouth.edu
Abstract Secure Function Evaluation (SFE) problems. We assume that a really trustworthy
TTP device will have very limited protected memory and computation environment---a\emph …

[引用][C] 报文解析工具中的XML 数据字典

刘烨, 王永斌, 刘宏波 - 计算机工程, 2009

[引用][C] 基于用户意图的网络流量授权安全框架

刘哲元, 徐隽, 汪兴, 高辉 - 小型微型计算机系统, 2016

[引用][C] 基于TPM 的强身份认证协议研究

徐贤, 龙宇, 毛贤平 - 计算机工程, 2012

Accountable administration in operating systems

L Zeng, H Chen, Y Xiao - International Journal of …, 2017 - inderscienceonline.com
Many security models and systems are based on the assumption that super users must be
trusted. It is difficult to hold super users accountable because they can erase any logs of …

Towards multilaterally secure computing platforms—with open source and trusted computing

AR Sadeghi, C Stüble - Information Security Technical Report, 2005 - Elsevier
We present a security architecture for a trustworthy open computing platform that aims at
solving a variety of security problems of conventional platforms by an efficient migration of …

Identifying native applications with high assurance

HMJ Almohri, D Yao, D Kafura - … of the second ACM conference on Data …, 2012 - dl.acm.org
Main stream operating system kernels lack a strong and reliable mechanism for identifying
the running processes and binding them to the corresponding executable applications. In …

[PDF][PDF] Broadcast Encryption Using Probabilistic Key Distribution and Applications.

M Ramkumar - J. Comput., 2006 - jcomputers.us
A family of novel broadcast encryption schemes based on probabilistic key pre-distribution
are proposed, that enable multiple sources to broadcast secrets, without the use of …

[引用][C] 基于可信计算平台的用户身份认证研究

李勇, 王飞, 刘威鹏 - 微计算机信息, 2009

An efficient algorithm for resource sharing in peer-to-peer networks

WC Liao, F Papadopoulos, K Psounis - … , May 15-19, 2006. Proceedings 5, 2006 - Springer
The performance of peer-to-peer systems depends on the level of cooperation of the
system's participants. While most existing peer-to-peer architectures have assumed that …