Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,398,464 papers from all fields of science
Search
Sign In
Create Free Account
Trusted third party
Known as:
TTP
In cryptography, a trusted third party (TTP) is an entity which facilitates interactions between two parties who both trust the third party; the…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
29 relations
Atomic authorization
Authentication protocol
Authorization
Certificate authority
Expand
Broader (1)
Public-key cryptography
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Privacy-preserving multi-hop profile-matching protocol for proximity mobile social networks
Entao Luo
,
Qin Liu
,
J. Abawajy
,
Guojun Wang
Future generations computer systems
2017
Corpus ID: 13631571
Highly Cited
2012
Highly Cited
2012
Security improvement on an anonymous key agreement protocol based on chaotic maps
Kaiping Xue
,
P. Hong
2012
Corpus ID: 62596927
Highly Cited
2011
Highly Cited
2011
Cloud computing security auditing
I.A. Gul
,
Atiq ur Rehman
,
M. H. Islam
The 2nd International Conference on Next…
2011
Corpus ID: 9137065
In the recent era, cloud computing has evolved as a net centric, service oriented computing model. Consumers purchase computing…
Expand
Highly Cited
2008
Highly Cited
2008
Modeling and Experimental Identification of Silicon Microheater Dynamics: A Systems Approach
A. Sebastian
,
D. Wiesmann
Journal of microelectromechanical systems
2008
Corpus ID: 5110948
Microfabricated silicon cantilevers with integrated heating elements are powerful tools for manipulation and interrogation at the…
Expand
2005
2005
Dependable Dynamic Source Routing without a Trusted Third Party
A. Pirzada
,
C. McDonald
,
A. Datta
Australasian Computer Science Conference
2005
Corpus ID: 16919652
Ad-hoc networks are frequently used to establish communication in improvised environments without requiring any fixed…
Expand
Highly Cited
2003
Highly Cited
2003
Does It Need Trusted Third Party? Design of Buyer-Seller Watermarking Protocol without Trusted Third Party
Jae-Gwi Choi
,
K. Sakurai
,
Ji-Hwan Park
International Conference on Applied Cryptography…
2003
Corpus ID: 26181006
Buyer-seller watermarking protocol is a combination of traditional watermarking and fingerprinting techniques. For example, in…
Expand
2001
2001
A Comparison of TTP/C and FlexRay
H. Kopetz
2001
Corpus ID: 15286154
With the announcement of BMW and DaimlerChrysler to 15 develop the new time-triggered protocol FlexRay for safety critical “Xby…
Expand
Highly Cited
2000
Highly Cited
2000
A universal smart transducer interface: TTP/A
H. Kopetz
,
M. Holzmann
,
W. Elmenreich
IEEE International Symposium on Real-Time…
2000
Corpus ID: 3061750
The primary goal of a universal smart transducer interface is the provision of a framework that helps to reduce the complexity of…
Expand
Highly Cited
1998
Highly Cited
1998
BRAKE-BY-WIRE WITHOUT MECHANICAL BACKUP BY USING A TTP-COMMUNICATION NETWORK
B. Hedenetz
,
R. Belschner
1998
Corpus ID: 54131273
Highly Cited
1996
Highly Cited
1996
RTCAST: lightweight multicast for real-time process groups
T. Abdelzaher
,
A. Shaikh
,
F. Jahanian
,
K. Shin
Proceedings Real-Time Technology and Applications
1996
Corpus ID: 11930720
We propose a lightweight fault tolerant multicast and membership service for real time process groups which may exchange periodic…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE