Sciweavers

28 search results - page 2 / 6
» Bootstrapping Trust in a
Sort
View
SIGOPSE
2004
ACM
13 years 11 months ago
Secure bootstrap is not enough: shoring up the trusted computing base
We propose augmenting secure boot with a mechanism to protect against compromises to field-upgradeable devices. In particular, secure boot standards should verify the firmware o...
James Hendricks, Leendert van Doorn
CN
2004
163views more  CN 2004»
13 years 5 months ago
Highly reliable trust establishment scheme in ad hoc networks
Securing ad hoc networks in a fully self-organized way is effective and light-weight, but fails to accomplish trust initialization in many trust deficient scenarios. To overcome t...
Kui Ren, Tieyan Li, Zhiguo Wan, Feng Bao, Robert H...
CCS
2009
ACM
14 years 25 days ago
A practical property-based bootstrap architecture
Binary attestation, as proposed by the Trusted Computing Group (TCG), is a pragmatic approach for software integrity protection and verification. However, it has also various sho...
René Korthaus, Ahmad-Reza Sadeghi, Christia...
SAINT
2006
IEEE
14 years 2 days ago
A Prototype of a Secure Autonomous Bootstrap Mechanism for Control Networks
There are many kinds of control networks, which have been used in various non-IP network areas, such as BA (Building Automation), FA (Factory Automation) and PA (Process Automatio...
Nobuo Okabe, Shoichi Sakane, Masahiro Ishiyama, At...
EMNLP
2004
13 years 7 months ago
Statistical Significance Tests for Machine Translation Evaluation
If two translation systems differ differ in performance on a test set, can we trust that this indicates a difference in true system quality? To answer this question, we describe b...
Philipp Koehn