Sciweavers

8655 search results - page 121 / 1731
» Challenges for Trusted Computing
Sort
View
ACMSE
2007
ACM
15 years 2 months ago
Honeypots: concepts, approaches, and challenges
Information security is a growing concern today for organizations and individuals alike. This has led to growing interest in more aggressive forms of defense to supplement the exi...
Iyatiti Mokube, Michele Adams
SAC
2006
ACM
15 years 4 months ago
STRUDEL: supporting trust in the dynamic establishment of peering coalitions
The Coalition Peering Domain (CPD) is a recent innovation within the field of mesh networking. It facilitates the management of community-area networks in a distributed and scala...
Daniele Quercia, Manish Lad, Stephen Hailes, Licia...
CVPR
2005
IEEE
16 years 7 hour ago
Overview of the Face Recognition Grand Challenge
Over the last couple of years, face recognition researchers have been developing new techniques. These developments are being fueled by advances in computer vision techniques, com...
P. Jonathon Phillips, Patrick J. Flynn, W. Todd Sc...
IDC
2009
Springer
15 years 4 months ago
A Trusted Defeasible Reasoning Service for Brokering Agents in the Semantic Web
Abstract. Based on the plethora of proposals and standards for logic- and rulebased reasoning for the Semantic Web (SW), a key factor for the success of SW agents is interoperabili...
Kalliopi Kravari, Efstratios Kontopoulos, Nick Bas...
IWNAS
2008
IEEE
15 years 4 months ago
Event-based Trust Framework Model in Wireless Sensor Networks
The security of wireless sensor networks is ever more important nowadays. Most of the proposed security protocols in wireless sensor networks are based on authentication and encry...
Haiguang Chen, Huafeng Wu, Jinchu Hu, Chuanshan Ga...