Sciweavers

8655 search results - page 285 / 1731
» Challenges for Trusted Computing
Sort
View
144
Voted
CSFW
2010
IEEE
15 years 6 months ago
A Framework for the Sound Specification of Cryptographic Tasks
Nowadays it is widely accepted to formulate the security of a protocol carrying out a given task via the "trusted-party paradigm," where the protocol execution is compar...
Juan A. Garay, Aggelos Kiayias, Hong-Sheng Zhou
ESORICS
2008
Springer
15 years 5 months ago
CROO: A Universal Infrastructure and Protocol to Detect Identity Fraud
Abstract. Identity fraud (IDF) may be defined as unauthorized exploitation of credential information through the use of false identity. We propose CROO, a universal (i.e. generic) ...
D. Nali, Paul C. van Oorschot
ICPR
2004
IEEE
16 years 4 months ago
Evaluation of Model-Based Interactive Flower Recognition
We introduce the concept of Computer Assisted Visual InterActive Recognition (CAVIAR). In CAVIAR, a parameterized geometrical model serves as the human-computer communication chan...
Jie Zou, George Nagy
128
Voted
EWSN
2009
Springer
16 years 3 months ago
secFleck: A Public Key Technology Platform for Wireless Sensor Networks
We describe the design and implementation of a public-key platform, secFleck, based on a commodity Trusted Platform Module (TPM) chip that extends the capability of a standard node...
Wen Hu, Peter I. Corke, Wen Chan Shih, Leslie Over...
PERCOM
2007
ACM
16 years 2 months ago
Middleware for Secure Home Access and Control
User adaptive systems in the context of pervasive computing can only unveil their power if based on a generic middleware managing private data and context information in combinati...
Andrés Marín López, Wolfgang ...