Abstract. We present a protocol that allows servers to securely distribute secrets to trusted platforms. The protocol maintains the confidentiality of secrets in the face of eavesdroppers and careless users. Given an ideal (tamper-proof) trusted platform, the protocol can even withstand attacks by dishonest users. As an example of its use, we present an application to secure document processing
We present the design of a distributed store that offers various levels of security guarantees while...
Existing protocols for archival systems make use of verifiability of shares in conjunction with a pr...
International audienceElectronic document transfer is a key operation in many of today's most import...
Abstract. We present a protocol that allows servers to securely distribute secrets to trusted platfo...
Trusted computing introduces the Trusted Platform Module (TPM) as a root of trust on an otherwise un...
The Trusted Platform Module (TPM) is a security hardware that is commonly found in most computers to...
Securing data is becoming a crucial need for most internet-based applications. In this research, we ...
Trusted Computing, as viewed by the Trusted Computing Group (TCG), promises to solve a num-ber of pr...
The amount of digital data generated and stored by users increases every day. In order to protect th...
Many applications are built upon private algorithms, and executing them in untrusted, remote enviro...
Building applications that ensure confidentiality of sensitive data is a non-trivial task. Such appl...
Trusted platform modules (TPMs) are hardware modules that are bound to a computer's motherboard, tha...
As the complexity of current software systems increases, we see a correlative increase in the number...
Electronic information in any enterprise is an asset, and may be stored in a database or as electron...
Secrets are the basis of most protocol security, enabling authentication and secrecy over untrusted ...
We present the design of a distributed store that offers various levels of security guarantees while...
Existing protocols for archival systems make use of verifiability of shares in conjunction with a pr...
International audienceElectronic document transfer is a key operation in many of today's most import...
Abstract. We present a protocol that allows servers to securely distribute secrets to trusted platfo...
Trusted computing introduces the Trusted Platform Module (TPM) as a root of trust on an otherwise un...
The Trusted Platform Module (TPM) is a security hardware that is commonly found in most computers to...
Securing data is becoming a crucial need for most internet-based applications. In this research, we ...
Trusted Computing, as viewed by the Trusted Computing Group (TCG), promises to solve a num-ber of pr...
The amount of digital data generated and stored by users increases every day. In order to protect th...
Many applications are built upon private algorithms, and executing them in untrusted, remote enviro...
Building applications that ensure confidentiality of sensitive data is a non-trivial task. Such appl...
Trusted platform modules (TPMs) are hardware modules that are bound to a computer's motherboard, tha...
As the complexity of current software systems increases, we see a correlative increase in the number...
Electronic information in any enterprise is an asset, and may be stored in a database or as electron...
Secrets are the basis of most protocol security, enabling authentication and secrecy over untrusted ...
We present the design of a distributed store that offers various levels of security guarantees while...
Existing protocols for archival systems make use of verifiability of shares in conjunction with a pr...
International audienceElectronic document transfer is a key operation in many of today's most import...