Verifiable delegation of computation over large datasets
We study the problem of computing on large datasets that are stored on an untrusted server.
We follow the approach of amortized verifiable computation introduced by Gennaro, Gentry …
We follow the approach of amortized verifiable computation introduced by Gennaro, Gentry …
[PDF][PDF] Twin clouds: An architecture for secure cloud computing
Cloud computing promises a more cost effective enabling technology to outsource storage
and computations. Existing approaches for secure outsourcing of data and arbitrary …
and computations. Existing approaches for secure outsourcing of data and arbitrary …
[图书][B] Bootstrapping trust in modern computers
Trusting a computer for a security-sensitive task (such as checking email or banking online)
requires the user to know something about the computer's state. We examine research on …
requires the user to know something about the computer's state. We examine research on …
Integrated circuit that uses a dynamic characteristic of the circuit
An integrated circuit has a first component that has a dynamic characteristic that varies
among like integrated circuits, for example, among integrated circuits fabricated using the …
among like integrated circuits, for example, among integrated circuits fabricated using the …
Block-based media content authentication
J Princen, P Srinivasan, CS Anderson - US Patent 7,991,999, 2011 - Google Patents
6,085,193 A 72000 Malkin et al. 7,644,429 B2 1/2010 Bayassi et al. 6,141,756. A 10/2000
Bright et al. 2001/0014882 A1 8/2001 Stefik et al. 6,148,340 A 1 1/2000 Bittinger et al. 2001 …
Bright et al. 2001/0014882 A1 8/2001 Stefik et al. 6,148,340 A 1 1/2000 Bittinger et al. 2001 …
Decryption key table access control on ASIC or ASSP
IL Coenen - US Patent 7,975,151, 2011 - Google Patents
An ASIC or ASSP has processor circuitry (110), a predeter mined initialization program (100)
for execution by the pro cessor circuitry at power up, and a non-volatile key table (120) …
for execution by the pro cessor circuitry at power up, and a non-volatile key table (120) …
Fighting mallory the insider: Strong write-once read-many storage assurances
R Sion, Y Chen - IEEE Transactions on Information Forensics …, 2011 - ieeexplore.ieee.org
We introduce a Write-Once Read-Many (WORM) storage system providing strong
assurances of data retention and compliant migration, by leveraging trusted secure …
assurances of data retention and compliant migration, by leveraging trusted secure …
Load balancing for a system of cryptographic processors
TJ Dewkett, C Fayad, JK Li, SKH Sutter… - US Patent …, 2011 - Google Patents
In an array of groups of cryptographic processors, the processors in each group operate
together but are securely connected through an external shared memory. The processors in …
together but are securely connected through an external shared memory. The processors in …
Integration of biometrics and pin pad on smart card
C Yang - 2011 - theses.ncl.ac.uk
Secure payment is the basis of electronic commerce (e-commerce). A large amount of
electronic payments are made via POS (point of sale) terminals using smart cards and …
electronic payments are made via POS (point of sale) terminals using smart cards and …
Silicon PUFs in practice
Low cost computing devices have become a key enabler of the digital economy, supporting
everyday activities such as banking, access control, and travel. These devices often present …
everyday activities such as banking, access control, and travel. These devices often present …