Sciweavers

4 search results - page 1 / 1
» Featuring trust and reputation management systems for constr...
Sort
View
AUTONOMICS
2007
ACM
13 years 9 months ago
Featuring trust and reputation management systems for constrained hardware devices
Research on trust management systems for wireless sensor networks is still at a very early stage and few works have done so far. It seems that for those works which deal with the ...
Rodrigo Roman, M. Carmen Fernández Gago, Ja...
IJISEC
2007
119views more  IJISEC 2007»
13 years 5 months ago
An incentive compatible reputation mechanism for ubiquitous computing environments
The vision of ubiquitous computing is becoming a reality thanks to the advent of portable devices and the advances in wireless networking technologies. It aims to facilitate user ...
Jinshan Liu, Valérie Issarny
WIMOB
2008
IEEE
13 years 11 months ago
A Protocol for Pervasive Distributed Computing Reliability
Abstract—The adoption of new hardware and software architectures will make future generations of pervasive devices more flexible and extensible. Networks of computational nodes ...
Alberto Ferrante, Roberto Pompei, Anastasia Stulov...
ISCA
2005
IEEE
88views Hardware» more  ISCA 2005»
13 years 10 months ago
Architecture for Protecting Critical Secrets in Microprocessors
We propose “secret-protected (SP)” architecture to enable secure and convenient protection of critical secrets for a given user in an on-line environment. Keys are examples of...
Ruby B. Lee, Peter C. S. Kwan, John Patrick McGreg...