The Community for Technology Leaders
RSS Icon
Issue No.02 - March/April (2005 vol.3)
pp: 20-28
Alexander Iliev , Dartmouth College
Sean W. Smith , Dartmouth College
Current trusted-computing initiatives usually involve large organizations putting physically secure hardware on user machines, potentially violating user privacy. Yet, it's possible to exploit robust server-side secure hardware to enhance user privacy. Two case studies demonstrate using secure coprocessors at the server.
Secure coprocessor, Private Information Retrieval, Oblivious RAM, prototype, PKI, network traffic archival
Alexander Iliev, Sean W. Smith, "Protecting Client Privacy with Trusted Computing at the Server", IEEE Security & Privacy, vol.3, no. 2, pp. 20-28, March/April 2005, doi:10.1109/MSP.2005.49
14 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool