Sciweavers

8655 search results - page 122 / 1731
» Challenges for Trusted Computing
Sort
View
DATE
2007
IEEE
73views Hardware» more  DATE 2007»
15 years 4 months ago
Design methods for security and trust
The design of ubiquitous and embedded computers focuses on cost factors such as area, power-consumption, and performance. Security and trust properties, on the other hand, are oft...
Ingrid Verbauwhede, Patrick Schaumont
GI
2005
Springer
15 years 3 months ago
Trust and quality in electronic communication: Getting to know your customers bit by bit
: A client was experiencing trust and information quality problems in his structured Internet communication with potential and existing customers. Customer information entered onli...
Andreas Neus, Philipp Scherf, Christian Gebert
ITRUST
2004
Springer
15 years 3 months ago
Analyzing Correlation between Trust and User Similarity in Online Communities
Abstract. Past evidence has shown that generic approaches to recommender systems based upon collaborative filtering tend to poorly scale. Moreover, their fitness for scenarios su...
Cai-Nicolas Ziegler, Georg Lausen
NDSS
1998
IEEE
15 years 2 months ago
On the Problem of Trust in Mobile Agent Systems
Systems that support mobile agents are increasingly being used on the global Internet. Security concerns dealing with the protection of the execution environment from malicious ag...
Uwe G. Wilhelm, Sebastian Staamann, Levente Butty&...
DAC
2007
ACM
15 years 1 months ago
Trusted Design in FPGAs
Using FPGAs, a designer can separate the design process from the manufacturing flow. Therefore, the owner of a sensitive design need not expose the design to possible theft and ta...
Steven Trimberger