Stanford CIS
Stefan Bechtold

Stefan Bechtold

Recent articles

Blog

DRM and Competition on Downstream Markets

Over the last two years, cases in which companies used DRM technology and the anti-circumvention provisions of the DMCA in order to control downstream markets a…

Blog

Sadeghi: Property-Based Attestation

Ahmad-Reza Sadeghi & Christian Stüble, Property-based Attestation for Computing Platforms: Caring about properties, not mechanisms,  New Security Paradigms…

Blog

Linus Torvalds Interview

BusinessWeek has published an interview with Linus Torvalds. First question: "What are the biggest challenges facing Linux?" Answer: "From a te…

Blog

"Bilateral" IP treaties

Recently, the United States and Australia have concluded a free trade agreement. Chapter 17 of the agreement includes some rather detailed provisions relating t…

Blog

TCG German Insurance Industry

Trusted Computing Group Clarifications for the German Insurance Industry Association paper "The Threat, Trusted Computing, to the German Insurance Industry…

Blog

DRM, anti-circumvention and competition

Apple's refusal to license its FairPlay DRM system used in iTunes to RealNetworks and RealNetworks' subsequent attempt to create interoperability by rev…

Blog

Putting Pirates in Jail

It is not only the United States where the content industry is taking an agressive approach towards its customers. In Germany, a lobbying organization of German…

Blog

Medical Privacy

Rachel Greenstadt & Jean-Francois Raymond, Applications of Trusted Computing for Medical Privacy, PORTIA workshop, Stanford, June 15, 2004.…

Blog

Flick Australia

Catherine Flick, The Controversy over Trusted Computing, University of Sydney B.Sc. thesis, June 2004.…

Blog

Haldar, Semantic Remote Attestation

Vivek Haldar, Deepak Chandra & Michael Franz, Semantic Remote Attestation - A Virtual Machine directed approach to Trusted Computing, in: Proceedings of the…

Blog

Camenish, Better Privacy

Jan Camenish, Better Privacy for Trusted Computing Platforms, in: Samarati (ed.), European Symposium on Research in Computer Security 2004, Lecture Notes in Com…