This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Protecting Client Privacy with Trusted Computing at the Server
March/April 2005 (vol. 3 no. 2)
pp. 20-28
Alexander Iliev, Dartmouth College
Sean W. Smith, Dartmouth College
Current trusted-computing initiatives usually involve large organizations putting physically secure hardware on user machines, potentially violating user privacy. Yet, it's possible to exploit robust server-side secure hardware to enhance user privacy. Two case studies demonstrate using secure coprocessors at the server.
Index Terms:
Secure coprocessor, Private Information Retrieval, Oblivious RAM, prototype, PKI, network traffic archival
Citation:
Alexander Iliev, Sean W. Smith, "Protecting Client Privacy with Trusted Computing at the Server," IEEE Security & Privacy, vol. 3, no. 2, pp. 20-28, March-April 2005, doi:10.1109/MSP.2005.49
Usage of this product signifies your acceptance of the Terms of Use.