Sciweavers

8655 search results - page 130 / 1731
» Challenges for Trusted Computing
Sort
View
COLCOM
2008
IEEE
15 years 4 months ago
Incentive and Trust Issues in Assured Information Sharing
Assured information sharing among different organizations in a coalitional environment is an important first step in accomplishing many critical tasks. For example, different secur...
Ryan Layfield, Murat Kantarcioglu, Bhavani M. Thur...
CCGRID
2004
IEEE
15 years 1 months ago
A reputation-based trust management system for P2P networks
The open and anonymous nature of a P2P network makes it an ideal medium for attackers to spread malicious content. In this paper, we propose a reputation-based trust management sy...
Ali Aydin Selçuk, Ersin Uzun, Mark Resat Pa...
JCP
2006
135views more  JCP 2006»
14 years 10 months ago
Improved Double Auction Protocol based on a Hybrid Trust Model
Recently, Wang et al. proposed a set of double auction protocols with full privacy protection based on distributed ElGamal encryption. Unfortunately, their protocols are expensive ...
JungHoon Ha, Jianying Zhou, Sang-Jae Moon
DAC
2011
ACM
13 years 9 months ago
TPM-SIM: a framework for performance evaluation of trusted platform modules
This paper presents a simulation toolset for estimating the impact of Trusted Platform Modules (TPMs) on the performance of applications that use TPM services, especially in multi...
Jared Schmitz, Jason Loew, Jesse Elwell, Dmitry Po...
AIHC
2007
Springer
15 years 4 months ago
Evaluating the Future of HCI: Challenges for the Evaluation of Emerging Applications
Current evaluation methods are inappropriate for emerging HCI applications. In this paper, we give three examples of these applications and show that traditional evaluation method...
Ronald Poppe, Rutger Rienks, Betsy van Dijk