Learn More
A trusted monotonic counter is a valuable primitive that enables a wide variety of highly scalable offline and decentralized applications that would otherwise be prone to replay attacks, including offline payment, e-wallets, virtual trusted storage, and digital rights management (DRM). In this paper, we show how one can implement a very large number of(More)
Project Bayanihan is developing the idea of volunteer computing, which seeks to enable people to form very large parallel computing networks very quickly by using ubiquitous and easy-to-use technologies such as web browsers and Java. By utilizing Java's object-oriented features, we have built a exible software framework that makes it easy for programmers to(More)
The explosive growth of interest in platform-independent programming languages for the WorldWide Web , such as Sun Microsystems' Java, is opening exciting new possibilites in parallel computing. This thesis will present and investigate the idea of volunteer computing, which will allow people to volunteer their computers' processing power towards solving a(More)
In this paper, we present the idea of <b><i>offline count-limited certificates</i></b> (or <b><i>clics</i></b> for short), and show how these can be implemented using minimal trusted hardware functionality already widely available today. Offline count-limited certificates are digital certificates that: (1) specify usage conditions that depend on(More)
Project Bayanihan seeks to develop the idea of volunteer computing, which allows people to very easily pool together their comput-ers' processing power and cooperate in solving parallel problems. While the idea of volunteer computing ooers many exciting new prospects in global supercomputing and collaboration, its realization involves many challenging(More)
OBJECTIVES The analysis of brain imaging data such as functional MRI often requires considerable computing resources, which in most cases are not readily available in many medical imaging facilities. This lack of computing power makes it difficult for researchers and medical practitioners alike to perform on-site analysis of the generated data. This paper(More)
This paper introduces the Trusted Execution Module (TEM); a high-level specification for a commodity chip that can execute user-supplied procedures in a trusted environment. The TEM is capable of securely executing partially-encrypted procedures/closures expressing arbitrary computation. These closures can be generated by any (potentially untrusted) party(More)
We address the problemof using an untrusted server with only a trusted timestamping device (<b>TTD</b>) to provide trusted storage for a large number of clients, where each client may own and use several different devices that may be offline at different times and may not be able to communicate with each other except through the untrusted server (over an(More)