Sciweavers

308 search results - page 56 / 62
» A New Model for Public-Key Authentication
Sort
View
JCP
2008
216views more  JCP 2008»
14 years 11 months ago
Direct Anonymous Attestation for Next Generation TPM
Trusted computing platforms have been proposed as a promising approach to enhance the security of general-purpose computing systems. Direct Anonymous Attestation(DAA) is a scheme t...
Xiaofeng Chen 0004, Dengguo Feng
VR
2010
IEEE
188views Virtual Reality» more  VR 2010»
14 years 10 months ago
Illuminating the past: state of the art
Virtual reconstruction and representation of historical environments and objects have been of research interest for nearly two decades. Physically-based and historically accurate ...
Jassim Happa, Mark Mudge, Kurt Debattista, Alessan...
EMNLP
2009
14 years 9 months ago
Statistical Estimation of Word Acquisition with Application to Readability Prediction
Models of language learning play a central role in a wide range of applications: from psycholinguistic theories of how people acquire new word knowledge, to information systems th...
Paul Kidwell, Guy Lebanon, Kevyn Collins-Thompson
ASIAN
2007
Springer
126views Algorithms» more  ASIAN 2007»
15 years 6 months ago
Computational Semantics for Basic Protocol Logic - A Stochastic Approach
Abstract. This paper is concerned about relating formal and computational models of cryptography in case of active adversaries when formal security analysis is done with first ord...
Gergei Bana, Koji Hasebe, Mitsuhiro Okada
116
Voted
CCS
2010
ACM
15 years 6 months ago
Secure provenance: the essential of bread and butter of data forensics in cloud computing
Secure provenance that records ownership and process history of data objects is vital to the success of data forensics in cloud computing, yet it is still a challenging issue toda...
Rongxing Lu, Xiaodong Lin, Xiaohui Liang, Xuemin (...