Sciweavers

8655 search results - page 201 / 1731
» Challenges for Trusted Computing
Sort
View
CN
2006
99views more  CN 2006»
14 years 10 months ago
P2P reputation management: Probabilistic estimation vs. social networks
Managing trust is a key issue for a wide acceptance of P2P computing, particularly in critical areas such as e-commerce. Reputation-based trust management has been identified in t...
Zoran Despotovic, Karl Aberer
SOUPS
2009
ACM
15 years 5 months ago
Ubiquitous systems and the family: thoughts about the networked home
Developments in ubiquitous and pervasive computing herald a future in which computation is embedded into our daily lives. Such a vision raises important questions about how people...
Linda Little, Elizabeth Sillence, Pamela Briggs
IJISEC
2007
119views more  IJISEC 2007»
14 years 10 months ago
An incentive compatible reputation mechanism for ubiquitous computing environments
The vision of ubiquitous computing is becoming a reality thanks to the advent of portable devices and the advances in wireless networking technologies. It aims to facilitate user ...
Jinshan Liu, Valérie Issarny
EUROCRYPT
2008
Springer
15 years 14 days ago
New Constructions for UC Secure Computation Using Tamper-Proof Hardware
The Universal Composability framework was introduced by Canetti to study the security of protocols which are concurrently executed with other protocols in a network environment. U...
Nishanth Chandran, Vipul Goyal, Amit Sahai
JITECH
2007
136views more  JITECH 2007»
14 years 10 months ago
A computer scientist's reactions to NPfIT
This paper contains a set of personal views relating to NHS Connecting for Health’s National Programme for IT (NPfIT), and in particular its Care Records Service, written from t...
Brian Randell