Sciweavers

1117 search results - page 197 / 224
» A Compliance Model of Trust
Sort
View
HICSS
2008
IEEE
124views Biometrics» more  HICSS 2008»
15 years 4 months ago
Measuring Factors that Influence the Success of E-Government Initiatives
Understanding how citizens value e-government services is critical to the success of these initiatives. This paper describes the development of a model to identify factors that in...
Ronnie Park
HOST
2008
IEEE
15 years 4 months ago
Hardware Trojan Detection Using Path Delay Fingerprint
—Trusted IC design is a recently emerged topic since fabrication factories are moving worldwide in order to reduce cost. In order to get a low-cost but effective hardware Trojan ...
Yier Jin, Yiorgos Makris
PRDC
2008
IEEE
15 years 4 months ago
Countering IPC Threats in Multiserver Operating Systems (A Fundamental Requirement for Dependability)
Multiserver operating systems have great potential to improve dependability, but, paradoxically, are paired with inherently more complex interprocess communication (IPC). Several ...
Jorrit N. Herder, Herbert Bos, Ben Gras, Philip Ho...
AINA
2007
IEEE
15 years 4 months ago
Leveraging Identity-Based Cryptography for Node ID Assignment in Structured P2P Systems
Abstract— Structured peer-to-peer systems have grown enormously because of their scalability, efficiency and reliability. These systems assign a unique identifier to each user ...
Sunam Ryu, Kevin R. B. Butler, Patrick Traynor, Pa...
IAT
2007
IEEE
15 years 4 months ago
Agent-Based Network Intrusion Detection System
The paper presents security platform based on agents as an efficient and robust solution for high-performance intrusion detection system designed for deployment on highspeed netw...
Vojtech Krmicek, Pavel Celeda, Martin Rehák...