Learn More
Secure coprocessors enable secure distributed applications by providing safe havens where an application program can Ž. execute and accumulate state , free of observation and interference by an adversary with direct physical access to the device. However, for these coprocessors to be effective, participants in such applications must be able to verify that(More)
Several credential systems have been proposed in which users can authenticate to services anonymously. Since anonymity can give users the license to misbehave, some variants allow the selective deanonymization (or linking) of misbehaving users upon a complaint to a trusted third party (TTP). The ability of the TTP to revoke a user's privacy at any time,(More)
The <i>Border Gateway Protocol (BGP)</i> controls inter-domain routing in the Internet. BGP is vulnerable to many attacks, since routers rely on hearsay information from neighbors. <i>Secure BGP (S-BGP)</i> uses DSA to provide route authentication and mitigate many of these risks. However, many performance and deployment issues prevent S-BGP's real-world(More)
T rusted-computing (TC) initiatives potentially give large organizations ways to control individu-als' use of their computers. Putting a physically protected component on a user's machine lets external organizations intrude on what previously had been the user's private space. However, we can turn the tables and put physically protected components on a(More)
Too often, " security of Web transactions " reduces to " encryption of the channel " —and neglects to address what happens at the server on the other end. This oversight forces clients to trust the good intentions and competence of the server operator—but gives clients no basis for that trust. Furthermore, despite academic and industrial research in secure(More)
Several anonymous authentication schemes allow servers to revoke a misbehaving user's ability to make future accesses. Traditionally, these schemes have relied on powerful TTPs capable of deanonymizing (or linking) users' connections. Recent schemes such as <i>Blacklistable Anonymous Credentials (BLAC)</i> and <i>Enhanced Privacy ID (EPID)</i> support(More)
An important organizational innovation enabled by the revolution in information technologies is 'open source' production which converts private commodities into essentially public goods. Similar to other public goods, incentives for reputation and group identity appear to motivate contributions to open source projects, overcoming the social dilemma inherent(More)