Sciweavers

8655 search results - page 168 / 1731
» Challenges for Trusted Computing
Sort
View
VOTEID
2007
Springer
15 years 4 months ago
Bingo Voting: Secure and Coercion-Free Voting Using a Trusted Random Number Generator
It is debatable if current direct-recording electronic voting machines can sufficiently be trusted for a use in elections. Reports about malfunctions and possible ways of manipulat...
Jens-Matthias Bohli, Jörn Müller-Quade, ...
ICN
2005
Springer
15 years 3 months ago
Scalable Group Key Management with Partially Trusted Controllers
Abstract. Scalable group key management solutions are crucial for supporting Internet applications that are based on a group communication model. Many solutions have been proposed ...
Himanshu Khurana, Rafael Bonilla, Adam J. Slagell,...
ISW
2004
Springer
15 years 3 months ago
A Hierarchical Key-Insulated Signature Scheme in the CA Trust Model
In key-insulated cryptography, there are many private keys with different indexes and a single, fixed public key. When the trust model includes multiple Certification Authoritie...
Zhengyi Le, Yi Ouyang, James Ford, Fillia Makedon
P2P
2003
IEEE
15 years 3 months ago
Establishing Trust in Distributed Storage Providers
— Corporate IT as well as individuals show increasing interest in reliable outsourcing of storage infrastructure. Decentralized solutions with their resilience against partial ou...
Germano Caronni, Marcel Waldvogel
85
Voted
CSCW
2008
ACM
15 years 3 days ago
Can you ever trust a wiki?: impacting perceived trustworthiness in wikipedia
Wikipedia has become one of the most important information resources on the Web by promoting peer collaboration and enabling virtually anyone to edit anything. However, this mutab...
Aniket Kittur, Bongwon Suh, Ed H. Chi