Sciweavers

8655 search results - page 218 / 1731
» Challenges for Trusted Computing
Sort
View
89
Voted
CCS
2009
ACM
15 years 3 months ago
TruWallet: trustworthy and migratable wallet-based web authentication
Identity theft has fostered to a major security problem on the Internet, in particular stealing passwords for web applications through phishing and malware. We present TruWallet, ...
Sebastian Gajek, Hans Löhr, Ahmad-Reza Sadegh...
ICDAR
2003
IEEE
15 years 4 months ago
Using Character Recognition and Segmentation to Tell Computer from Humans
How do you tell a computer from a human? The situation arises often on the Internet, when online polls are conducted, accounts are requested, undesired email is received, and chat...
Patrice Y. Simard, Richard Szeliski, Josh Benaloh,...
ICSE
2003
IEEE-ACM
15 years 11 months ago
A Framework for Component Deployment Testing
Component-based development is the emerging paradigm in software production, though several challenges still slow down its full taking up. In particular, the "component trust...
Antonia Bertolino, Andrea Polini
ACSAC
2009
IEEE
15 years 5 months ago
Protecting Kernel Code and Data with a Virtualization-Aware Collaborative Operating System
Abstract—The traditional virtual machine usage model advocates placing security mechanisms in a trusted VM layer and letting the untrusted guest OS run unaware of the presence of...
Daniela Alvim Seabra de Oliveira, Shyhtsun Felix W...
74
Voted
NOMS
2006
IEEE
15 years 5 months ago
UNIQuE: A User-Centric Framework for Network Identity Management
—Network identity management system, in theory, is conceived as the solution to many identity-related issues burgeoning day-to-day. These issues, which need to be addressed, rang...
Jörn Altmann, Rajarajan Sampath