Repudiative information retrieval

D Asonov, JC Freytag - Proceedings of the 2002 ACM workshop on …, 2002 - dl.acm.org
Privacy is preserved while retrieving an i-th record from the database of N records if no
information is revealed about i, not even to the database server. Repudiation is preserved in …

Towards accountable management of privacy and identity information

MC Mont, S Pearson, P Bramhall - … , Gjøvik, Norway, October 13-15, 2003 …, 2003 - Springer
Digital identities and profiles are valuable assets: they are more and more relevant to allow
people to access services and information on the Internet. They need to be secured and …

Protecting cryptographic keys and computations via virtual secure coprocessing

JP McGregor, RB Lee - ACM SIGARCH Computer Architecture News, 2005 - dl.acm.org
Cryptographic processing is a critical component of secure networked computing systems.
The protection offered by cryptographic processing, however, greatly depends on the …

Continuous run-time validation of program execution: a practical approach

K Ghose - US Patent 9,767,284, 2017 - Google Patents
Trustworthy systems require that code be validated as genuine. Most systems implement this
requirement prior to execution by matching a cryptographic hash of the binary file against a …

Electronic cash controlled by non-homomorphic signatures

R Gennaro, C Tresser - US Patent 7,640,432, 2009 - Google Patents
An Object of this invention is to improve cryptography methods and systems. Another object
of the present invention is to provide a method and apparatus to create and manage …

Used trusted co-servers to enhance security of web interaction

DM Chess, J Dyer, N Itoi, J Kravitz, ER Palmer… - US Patent …, 2007 - Google Patents
(22) Filed: Sep. 15, 2000 1,, and then said co-server carries out N functions: Fl.(i0... In)
describes What the co-server returns to party P,. The (51) Int-Cl- preferred embodiment of …

The PAPRICA massively parallel processor

A Broggi, G Conte, F Gregoretti… - Proceedings of the …, 1994 - ieeexplore.ieee.org
This paper describes a complete 6-year project, starting from its theoretical basis up to the
hardware and software system implementation, and to the description of its future evolution …

Towards database firewalls

K Bai, H Wang, P Liu - Data and Applications Security XIX: 19th Annual …, 2005 - Springer
Authentication based access control and integrity constraints are the major approaches
applied in commercial database systems to guarantee information and data integrity …

[PDF][PDF] Application support architecture for a high-performance, programmable secure coprocessor

J Dyer, R Perez, S Smith… - 22nd National Information …, 1999 - cs.dartmouth.edu
A “secure system” should be secure—but should also be a system that achieves some
particular functionality. A family of secure systems that our group has been investigating …

Delivery of license information using a short messaging system protocol in a closed content distribution system

W Yen, J Princen, R Lo, P Srinivasan - US Patent 7,779,482, 2010 - Google Patents
Delivery of licenses in a closed distribution system including a playback device and secure
processor. The secure processor allows only use of authorized content, and the playback …