Zobrazeno 1 - 10
of 1 203
pro vyhledávání: '"Direct Anonymous Attestation"'
Publikováno v:
IEEE Access, Vol 10, Pp 93701-93730 (2022)
Micropayments are one of the challenges in cryptocurrencies. Micropayments on the blockchain have the problem that the fee is high for the transfer amount. As a countermeasure, a method called Layer-two has been proposed to consolidate transactions o
Externí odkaz:
https://doaj.org/article/3420fb83756b4f8caa295b67737ce547
Publikováno v:
Tongxin xuebao, Vol 39, Pp 113-133 (2018)
s: At present, the main drawbacks of existing k-times attribute-based authentication (abbreviated to k-TABA) schemes and related attribute-based authentication schemes are that the computation cost of the authentication process depends on the size of
Externí odkaz:
https://doaj.org/article/378ca972d89145d19a576973cf3c9366
Publikováno v:
Tongxin xuebao, Vol 37, Pp 30-45 (2016)
A multi-coupon system for multi-merchant environments was proposed by extending the DAA (direct anonymous attestation) scheme of Brickell etc.The new system bound the key elements in multi-coupon with the tamper-resistant TPM(trusted platform modul
Externí odkaz:
https://doaj.org/article/2b0504b7adc64b279f17e497b5be6104
Publikováno v:
Journal of Computer Security. 30:109-165
When peers rate each other, they may rate inaccurately to boost their own reputation or unfairly lower another’s. This could be mitigated by having a reputation server incentivise accurate ratings with a reward. However, assigning rewards becomes c
Publikováno v:
IEEE Transactions on Information Forensics and Security. 16:2260-2275
Direct Anonymous Attestation (DAA) is an anonymous signature scheme, which allows the Trusted Platform Module (TPM), a small chip embedded in a host computer, to attest to the state of the host system, while preserving the privacy of the user. DAA pr
Publikováno v:
IET Information Security. 14:232-240
To improve the security and efficiency of remote attestation (RA) for embedded systems, this study proposes mutual authentication-based RA scheme for embedded systems. Especially, the authors design an RA framework based on authentication agents and
Autor:
Leonel Sousa, Paulo Martins
Publikováno v:
IEEE Access
IEEE Access, Vol 8, Pp 59533-59549 (2020)
IEEE Access, Vol 8, Pp 59533-59549 (2020)
Number representation systems establish ways in which numbers are mapped to computer architectures, and how operations over the numbers are translated into computer instructions. The efficiency of public-key cryptography is strongly affected by the u
Autor:
Nada El Kassem, Liqun Chen, Patrick Hough, Paulo Martins, Rachid El Bansarkhani, Jan Camenisch, Ali El Kaafarani, Leonel Sousa
Publikováno v:
Future Generation Computer Systems
The Cloud-Edges (CE) framework, wherein small groups of Internet of Things (IoT) devices are serviced by local edge devices, enables a more scalable solution to IoT networks. The trustworthiness of the network may be ensured with Trusted Platform Mod
Publikováno v:
Enterprise Information Systems. 15:513-529
Privacy leakage is becoming more and more serious in enterprise information management. To solve the poor security problems, by introducing short signatures into enterprise information managements,...
Publikováno v:
Security and Communication Networks, Vol 2021 (2021)
Privacy protection and message authentication issues in VANETs have received great attention in academia. Many authentication schemes in VANETs have been proposed, but most of them are based on classical difficult problems such as factorization in RS