The Community for Technology Leaders
Green Image
Issue No. 02 - March/April (2005 vol. 3)
ISSN: 1540-7993
pp: 20-28
Sean W. Smith , Dartmouth College
Alexander Iliev , Dartmouth College
Current trusted-computing initiatives usually involve large organizations putting physically secure hardware on user machines, potentially violating user privacy. Yet, it's possible to exploit robust server-side secure hardware to enhance user privacy. Two case studies demonstrate using secure coprocessors at the server.
Secure coprocessor, Private Information Retrieval, Oblivious RAM, prototype, PKI, network traffic archival
Sean W. Smith, Alexander Iliev, "Protecting Client Privacy with Trusted Computing at the Server", IEEE Security & Privacy, vol. 3, no. , pp. 20-28, March/April 2005, doi:10.1109/MSP.2005.49
303 ms
(Ver 3.3 (11022016))