Sciweavers

8655 search results - page 222 / 1731
» Challenges for Trusted Computing
Sort
View
84
Voted
ASIACRYPT
2000
Springer
15 years 3 months ago
Distributed Oblivious Transfer
The mobile agent is a fundamental building block of the mobile computing paradigm. In mobile agent security, oblivious transfer (OT) from a trusted party can be used to protect th...
Moni Naor, Benny Pinkas
PST
2008
15 years 11 days ago
An Access Control Scheme for Protecting Personal Data
This paper presents a new personal data access control (PDAC) scheme that is inspired by the protection schemes practiced in communities for sharing valuable commodities. The PDAC...
Wilfred Villegas, Bader Ali, Muthucumaru Maheswara...
88
Voted
IJACT
2008
136views more  IJACT 2008»
14 years 11 months ago
Anonymous RFID authentication supporting constant-cost key-lookup against active adversaries
: In the absence of sufficiently optimised public key constructions, anonymous authentication for Radio-Frequency Identification Devices (RFIDs) requires state synchronisation betw...
Mike Burmester, Breno de Medeiros, Rossana Motta
CISIS
2010
IEEE
15 years 5 months ago
Gene Ontology Rewritten for Computing Gene Functional Similarity
Abstract—Discovery biological organisation of the cell in modules network is a challenging task. Currently, approaches based on a controlled vocabulary, as Gene Ontology, to iden...
Alessia Visconti, Francesca Cordero, Marco Botta, ...
DEXAW
2005
IEEE
138views Database» more  DEXAW 2005»
15 years 4 months ago
Towards a Better Integration of Data Mining and Decision Support via Computational Intelligence
Despite a high level of activity and a large number of researchers involved, current research in data mining is plagued with several serious problems that should be regarded as to...
Sylvain Delisle