Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Josh D. Benaloh is active.

Publication


Featured researches published by Josh D. Benaloh.


Archive | 2005

Methods and systems of protecting digital content

Josh D. Benaloh; Andrew D. Rosen; Gideon A. Yuval


Archive | 2005

Manifest-based trusted agent management in a trusted operating system environment

Paul England; Marcus Peinado; Daniel R. Simon; Josh D. Benaloh


Archive | 2003

Deriving a symmetric key from an asymmetric key for file encryption or decryption

David B. Cross; Jianrong Gu; Josh D. Benaloh; Thomas C. Jones; Paul J. Leach; Glenn D. Pittaway


Archive | 2002

Use of hashing in a secure boot loader

Dinarte R. Morais; Jon Lange; Daniel R. Simon; Ling Tony Chen; Josh D. Benaloh


Archive | 2005

Transferring application secrets in a trusted operating system environment

Paul England; Marcus Peinado; Daniel R. Simon; Josh D. Benaloh


Archive | 2004

Systems and methods for compression of key sets having multiple keys

Josh D. Benaloh


Archive | 2012

Authentication ticket validation

Josh D. Benaloh; Ismail Cem Paya


Archive | 2003

System and method for providing an audio challenge to distinguish a human from a computer

Cormac Herley; James Droppo; Joshua T. Goodman; Josh D. Benaloh; Iulian D. Calinov; Jeff Steinbok


Archive | 2004

Human interactive proof sevice

Ismail Cem Paya; Josh D. Benaloh; Raja Pazhanivel Perumal; Trevin Chow; Erren Dusan Lester; Jeffrey E. Steinbok; Julien Couvreur


Archive | 2005

Encrypted content data structure package and generation thereof

Josh D. Benaloh

Collaboration


Dive into the Josh D. Benaloh's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge