The increasing growth in the use of Hardware Security Modules (HSMs) towards identification and authentication of a security endpoint have raised numerous privacy and security concerns. HSMs have the ability to tie a system or an object, along with its users to the physical world. However, this enables tracking of the user and/or an object associated with the HSM. Current systems do not adequately address the privacy needs and as such are susceptible to various attacks. In this work, we analyse various security and privacy concerns that arise when deploying such hardware security modules and propose a system that allow users to create pseudonyms from a trusted master public-secret key pair. The proposed system is based on the intractability...
In today's data-driven world, we are conflicted with two opposing phenomena. On the one hand, collec...
We conduct more and more of our daily interactions over electronic media. The EC-funded project PRIM...
Fingerprinting is an essential tool to shun legal buyers of digital content from illegal redistribut...
The increasing growth in the use of Hardware Security Modules (HSMs) towards identification and auth...
A pseudonym provides anonymity by protecting the identity of a legitimate user. A user with a pseudo...
This thesis explores how hardware security technologies can be applied to satisfy the diverse set of...
Current standardization efforts for cooperative Intelligent Transportation Systems both in the U.S. ...
Machine to Machine (M2M) applications enable a better management of resources and provide users With...
Embedded devices are nowadays largely represented across the compute continuum. From mobile phones t...
Privacy-Enhancing Identity Management (PIM) enables users to control which personal information they...
Abstract. The trusted computing group (TCG) specified two protocols that allow a trusted hardware de...
The theoretical construct of a Trusted Third Party (TTP) has the potential to solve many security an...
Anonymous attestation for secure hardware platforms leverages tailored group signature schemes and a...
Abstract. This paper presents a method to generate unique and nevertheless highly random pseudonyms ...
In today's data-driven world, we are conflicted with two opposing phenomena. On the one hand, collec...
In today's data-driven world, we are conflicted with two opposing phenomena. On the one hand, collec...
We conduct more and more of our daily interactions over electronic media. The EC-funded project PRIM...
Fingerprinting is an essential tool to shun legal buyers of digital content from illegal redistribut...
The increasing growth in the use of Hardware Security Modules (HSMs) towards identification and auth...
A pseudonym provides anonymity by protecting the identity of a legitimate user. A user with a pseudo...
This thesis explores how hardware security technologies can be applied to satisfy the diverse set of...
Current standardization efforts for cooperative Intelligent Transportation Systems both in the U.S. ...
Machine to Machine (M2M) applications enable a better management of resources and provide users With...
Embedded devices are nowadays largely represented across the compute continuum. From mobile phones t...
Privacy-Enhancing Identity Management (PIM) enables users to control which personal information they...
Abstract. The trusted computing group (TCG) specified two protocols that allow a trusted hardware de...
The theoretical construct of a Trusted Third Party (TTP) has the potential to solve many security an...
Anonymous attestation for secure hardware platforms leverages tailored group signature schemes and a...
Abstract. This paper presents a method to generate unique and nevertheless highly random pseudonyms ...
In today's data-driven world, we are conflicted with two opposing phenomena. On the one hand, collec...
In today's data-driven world, we are conflicted with two opposing phenomena. On the one hand, collec...
We conduct more and more of our daily interactions over electronic media. The EC-funded project PRIM...
Fingerprinting is an essential tool to shun legal buyers of digital content from illegal redistribut...