Browsing CSAIL Technical Reports (July 1, 2003 - present) by Subject "key delegation"
Now showing items 1-1 of 1
-
Virtual Monotonic Counters and Count-Limited Objects using a TPM without a Trusted OS (Extended Version)
(2006-09-11)A trusted monotonic counter is a valuable primitive thatenables a wide variety of highly scalable offlineand decentralized applications that would otherwise be prone to replay attacks, including offline payment, e-wallets, ...