The Community for Technology Leaders
Green Image
Issue No. 02 - March/April (2005 vol. 3)
ISSN: 1540-7993
pp: 20-28
Alexander Iliev , Dartmouth College
Sean W. Smith , Dartmouth College
Current trusted-computing initiatives usually involve large organizations putting physically secure hardware on user machines, potentially violating user privacy. Yet, it's possible to exploit robust server-side secure hardware to enhance user privacy. Two case studies demonstrate using secure coprocessors at the server.
Secure coprocessor, Private Information Retrieval, Oblivious RAM, prototype, PKI, network traffic archival

S. W. Smith and A. Iliev, "Protecting Client Privacy with Trusted Computing at the Server," in IEEE Security & Privacy, vol. 3, no. , pp. 20-28, 2005.
92 ms
(Ver 3.3 (11022016))