Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Ronald Aigner is active.

Publication


Featured researches published by Ronald Aigner.


trust and trustworthy computing | 2013

Improving Trusted Tickets with State-Bound Keys

Jan C. Nordholz; Ronald Aigner; Paul England

Traditional network authentication systems like Windows’ Active Directory or MIT’s Kerberos only provide for mutual authentication of communicating entities, e.g. a user’s email client interacting with an IMAP server, while the user’s machine is inherently assumed to be trusted. While there have been first attempts to explicitly establish this trust relationship by leveraging the Trusted Platform Module, these provide no means to directly react to potentially relevant changes in the client’s system state. We expand previous designs by binding keys to the current platform state and involving these in the network authentication process, thereby guaranteeing the continued validity of the attestee.


usenix security symposium | 2016

fTPM: A Software-Only Implementation of a TPM Chip

Himanshu Raj; Stefan Saroiu; Alec Wolman; Ronald Aigner; Jeremiah Cox; Paul England; Chris Fenner; Kinshuman Kinshumann; Jork Löser; Dennis Mattoon; Magnus Nystrom; David Robinson; Rob Spiger; Stefan Thom; David R. Wooten


Archive | 2013

Technique to Reverse Automatic Screen Content Rotation

Ronald Aigner


Archive | 2015

fTPM: A Firmware-based TPM 2.0 Implementation

Himanshu Raj; Stefan Saroiu; Alec Wolman; Ronald Aigner; Jeremiah Cox; Paul England; Chris Fenner; Kinshuman Kinshumann; Jork Loeser; Dennis Mattoon; Magnus Nystrom; David Robinson; Rob Spiger; Stefan Thom; David R. Wooten


Archive | 2014

Trust service for a client device

Stefan Thom; Ronald Aigner; Dennis Mattoon; Stuart Schaefer; Merzin Kapadia; Robert Karl Spiger; David R. Wooten; Paul England


Archive | 2013

Global platform health management

Stefan Thom; Ronald Aigner


Archive | 2016

Portable Security Device

Stefan Thom; Ronald Aigner


Archive | 2015

Secure Cryptoprocessor for Authorizing Connected Device Requests

Ronald Aigner; Kevin Kane; Stefan Thom


Archive | 2010

HIERARCHICAL SOFTWARE LOCKING

Jonathan Ross; Ronald Aigner; Jan Simon Rellermeyer; Jork Loeser


Archive | 2014

Secure os boot as per reference platform manifest and data sealing

Stefan Thom; Ronald Aigner

Collaboration


Dive into the Ronald Aigner's collaboration.

Researchain Logo
Decentralizing Knowledge