Verifiable delegation of computation over large datasets

S Benabbas, R Gennaro, Y Vahlis - Annual Cryptology Conference, 2011 - Springer
We study the problem of computing on large datasets that are stored on an untrusted server.
We follow the approach of amortized verifiable computation introduced by Gennaro, Gentry …

[PDF][PDF] Twin clouds: An architecture for secure cloud computing

S Bugiel, S Nurnberger, A Sadeghi… - … on cryptography and …, 2011 - cachin.com
Cloud computing promises a more cost effective enabling technology to outsource storage
and computations. Existing approaches for secure outsourcing of data and arbitrary …

[图书][B] Bootstrapping trust in modern computers

B Parno, JM McCune, A Perrig - 2011 - books.google.com
Trusting a computer for a security-sensitive task (such as checking email or banking online)
requires the user to know something about the computer's state. We examine research on …

Integrated circuit that uses a dynamic characteristic of the circuit

S Devadas, B Gassend - US Patent 7,904,731, 2011 - Google Patents
An integrated circuit has a first component that has a dynamic characteristic that varies
among like integrated circuits, for example, among integrated circuits fabricated using the …

Block-based media content authentication

J Princen, P Srinivasan, CS Anderson - US Patent 7,991,999, 2011 - Google Patents
6,085,193 A 72000 Malkin et al. 7,644,429 B2 1/2010 Bayassi et al. 6,141,756. A 10/2000
Bright et al. 2001/0014882 A1 8/2001 Stefik et al. 6,148,340 A 1 1/2000 Bittinger et al. 2001 …

Decryption key table access control on ASIC or ASSP

IL Coenen - US Patent 7,975,151, 2011 - Google Patents
An ASIC or ASSP has processor circuitry (110), a predeter mined initialization program (100)
for execution by the pro cessor circuitry at power up, and a non-volatile key table (120) …

Fighting mallory the insider: Strong write-once read-many storage assurances

R Sion, Y Chen - IEEE Transactions on Information Forensics …, 2011 - ieeexplore.ieee.org
We introduce a Write-Once Read-Many (WORM) storage system providing strong
assurances of data retention and compliant migration, by leveraging trusted secure …

Load balancing for a system of cryptographic processors

TJ Dewkett, C Fayad, JK Li, SKH Sutter… - US Patent …, 2011 - Google Patents
In an array of groups of cryptographic processors, the processors in each group operate
together but are securely connected through an external shared memory. The processors in …

Integration of biometrics and pin pad on smart card

C Yang - 2011 - theses.ncl.ac.uk
Secure payment is the basis of electronic commerce (e-commerce). A large amount of
electronic payments are made via POS (point of sale) terminals using smart cards and …

Silicon PUFs in practice

P Koeberl, J Li, A Rajan, C Vishik - ISSE 2010 Securing Electronic …, 2011 - Springer
Low cost computing devices have become a key enabler of the digital economy, supporting
everyday activities such as banking, access control, and travel. These devices often present …