We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 502 results
  1. Hash-Based Direct Anonymous Attestation

    Direct Anonymous Attestation (DAA) was designed for the Trusted Platform Module (TPM) and versions using RSA and elliptic curve cryptography have...
    Liqun Chen, Changyu Dong, ... Yalan Wang in Post-Quantum Cryptography
    Conference paper 2023
  2. Direct Anonymous Attestation

    Edlira Dushku, Thanassis Giannetsos, Nicola Dragoni in Encyclopedia of Cryptography, Security and Privacy
    Living reference work entry 2022
  3. Towards a Privacy-Preserving Attestation for Virtualized Networks

    TPM remote attestation allows to verify the integrity of the boot sequence of a remote device. Deep Attestation extends that concept to virtualized...
    Ghada Arfaoui, Thibaut Jacques, ... Léo Robert in Computer Security – ESORICS 2023
    Conference paper 2024
  4. Improving the security of direct anonymous attestation under host corruptions

    Direct anonymous attestation (DAA) enables a platform including a trusted platform module (TPM) to produce a signature in order to remotely attest...

    Hyoseung Kim, Kwangsu Lee, ... Dong Hoon Lee in International Journal of Information Security
    Article 02 July 2020
  5. Swarm Attestation

    Edlira Dushku, Nicola Dragoni in Encyclopedia of Cryptography, Security and Privacy
    Living reference work entry 2023
  6. Pass-As-You-Go: A Direct Anonymous Attestation-Based Untraceable Contactless Transit Pass

    The secure deployment of NFC-enabled digital services, such as electronic payment, electronic identification (eID), and mobile transit passes in...
    Aïda Diop, Nicolas Desmoulins, Jacques Traoré in Applied Cryptography and Network Security Workshops
    Conference paper 2021
  7. SoK: Anonymous Credentials

    Anonymous credentials are a powerful tool for making assertions about identity while maintaining privacy and have been the subject of study for many...
    Saqib A. Kakvi, Keith M. Martin, ... Elizabeth A. Quaglia in Security Standardisation Research
    Conference paper 2023
  8. To Attest or Not to Attest, This is the Question – Provable Attestation in FIDO2

    FIDO2 is currently the main initiative for passwordless authentication in web servers. It mandates the use of secure hardware authenticators to...
    Nina Bindel, Nicolas Gama, ... Eyal Ronen in Advances in Cryptology – ASIACRYPT 2023
    Conference paper 2023
  9. Towards an attestation architecture for blockchain networks

    If blockchain networks are to become the building blocks of the infrastructure for the future digital economy, then several challenges related to the...

    Thomas Hardjono, Ned Smith in World Wide Web
    Article Open access 11 March 2021
  10. A Cryptographic View of Deep-Attestation, or How to Do Provably-Secure Layer-Linking

    Deep attestation is a particular case of remote attestation, i.e., verifying the integrity of a platform with a remote verification server. We focus...
    Ghada Arfaoui, Pierre-Alain Fouque, ... Léo Robert in Applied Cryptography and Network Security
    Conference paper 2022
  11. Remote Attestation in IoT Devices

    Abstract
    Edlira Dushku, Nicola Dragoni in Encyclopedia of Cryptography, Security and Privacy
    Living reference work entry 2022
  12. ACDC: Anonymous Crowdsourcing Using Digital Cash

    Crowdsourcing applications are vulnerable to Sybil attacks where attackers create many accounts to submit bogus or malicious data at scale. The...
    Luis A. Saavedra, Alastair R. Beresford in Cryptology and Network Security
    Conference paper 2022
  13. Attribute-Based Anonymous Credential: Optimization for Single-Use and Multi-Use

    User attributes can be authenticated by an attribute-based anonymous credential while kee** the anonymity of the user. Most attribute-based...
    Kwan Yin Chan, Tsz Hon Yuen in Cryptology and Network Security
    Conference paper 2022
  14. Root-of-Trust Abstractions for Symbolic Analysis: Application to Attestation Protocols

    A key component in building trusted computing services is a highly secure anchor that serves as a Root-of-Trust (RoT). There are several works that...
    Georgios Fotiadis, José Moreira, ... Peter Y. A. Ryan in Security and Trust Management
    Conference paper 2021
  15. Anonymous Trusted Data Relocation for TEEs

    Trusted Execution Environment (TEE) technology like ARM TrustZone allows protecting confidential data using cryptographic keys that are bound to a...
    Vasco Guita, Daniel Andrade, ... Miguel Correia in ICT Systems Security and Privacy Protection
    Conference paper 2022
  16. Subversion-Resilient Enhanced Privacy ID

    Anonymous attestation for secure hardware platforms leverages tailored group signature schemes and assumes the hardware to be trusted. Yet, there is...
    Antonio Faonio, Dario Fiore, ... Claudio Soriente in Topics in Cryptology – CT-RSA 2022
    Conference paper 2022
  17. Electronic Cash with Open-Source Observers

    Electronic cash (e-cash) systems need to satisfy the property of anonymity, unforgeability, and transparency which prevent criminal activities from...
    Conference paper 2024
  18. An efficient post-quantum secure dynamic EPID signature scheme using lattices

    Enhanced Privacy ID (EPID) signatures can be viewed as a direct anonymous attestation mechanism with expanded revocation capabilities. When the...

    Chinmoy Biswas, Ratna Dutta, Sumanta Sarkar in Multimedia Tools and Applications
    Article 10 July 2023
  19. Establishing Secure Communication Channels Using Remote Attestation with TPM 2.0

    Remote attestation allows a verifier to remotely check the integrity of a trusted computing platform. In recent years a number of attestation...
    Paul Georg Wagner, Pascal Birnstill, Jürgen Beyerer in Security and Trust Management
    Conference paper 2020
  20. Unlinkable Delegation of WebAuthn Credentials

    The W3C’s WebAuthn standard employs digital signatures to offer phishing protection and unlinkability on the web using authenticators which manage...
    Nick Frymann, Daniel Gardham, Mark Manulis in Computer Security – ESORICS 2022
    Conference paper 2022
Did you find what you were looking for? Share feedback.