Repudiative information retrieval
D Asonov, JC Freytag - Proceedings of the 2002 ACM workshop on …, 2002 - dl.acm.org
Privacy is preserved while retrieving an i-th record from the database of N records if no
information is revealed about i, not even to the database server. Repudiation is preserved in …
information is revealed about i, not even to the database server. Repudiation is preserved in …
Towards accountable management of privacy and identity information
Digital identities and profiles are valuable assets: they are more and more relevant to allow
people to access services and information on the Internet. They need to be secured and …
people to access services and information on the Internet. They need to be secured and …
Protecting cryptographic keys and computations via virtual secure coprocessing
JP McGregor, RB Lee - ACM SIGARCH Computer Architecture News, 2005 - dl.acm.org
Cryptographic processing is a critical component of secure networked computing systems.
The protection offered by cryptographic processing, however, greatly depends on the …
The protection offered by cryptographic processing, however, greatly depends on the …
Continuous run-time validation of program execution: a practical approach
K Ghose - US Patent 9,767,284, 2017 - Google Patents
Trustworthy systems require that code be validated as genuine. Most systems implement this
requirement prior to execution by matching a cryptographic hash of the binary file against a …
requirement prior to execution by matching a cryptographic hash of the binary file against a …
Electronic cash controlled by non-homomorphic signatures
An Object of this invention is to improve cryptography methods and systems. Another object
of the present invention is to provide a method and apparatus to create and manage …
of the present invention is to provide a method and apparatus to create and manage …
Used trusted co-servers to enhance security of web interaction
DM Chess, J Dyer, N Itoi, J Kravitz, ER Palmer… - US Patent …, 2007 - Google Patents
(22) Filed: Sep. 15, 2000 1,, and then said co-server carries out N functions: Fl.(i0... In)
describes What the co-server returns to party P,. The (51) Int-Cl- preferred embodiment of …
describes What the co-server returns to party P,. The (51) Int-Cl- preferred embodiment of …
The PAPRICA massively parallel processor
This paper describes a complete 6-year project, starting from its theoretical basis up to the
hardware and software system implementation, and to the description of its future evolution …
hardware and software system implementation, and to the description of its future evolution …
Towards database firewalls
Authentication based access control and integrity constraints are the major approaches
applied in commercial database systems to guarantee information and data integrity …
applied in commercial database systems to guarantee information and data integrity …
[PDF][PDF] Application support architecture for a high-performance, programmable secure coprocessor
A “secure system” should be secure—but should also be a system that achieves some
particular functionality. A family of secure systems that our group has been investigating …
particular functionality. A family of secure systems that our group has been investigating …
Delivery of license information using a short messaging system protocol in a closed content distribution system
Delivery of licenses in a closed distribution system including a playback device and secure
processor. The secure processor allows only use of authorized content, and the playback …
processor. The secure processor allows only use of authorized content, and the playback …