Sciweavers

8655 search results - page 293 / 1731
» Challenges for Trusted Computing
Sort
View
IAT
2005
IEEE
15 years 9 months ago
Exploiting Multi-Agent Interactions for Identifying the Best-Payoff Information Source
In many different applications on the Web, distributed agents would like to discover and access high quality information sources. This is a challenging problem since an agent does...
Young-Woo Seo, Katia P. Sycara
109
Voted
INFOCOM
2005
IEEE
15 years 9 months ago
PIKE: peer intermediaries for key establishment in sensor networks
— The establishment of shared cryptographic keys between communicating neighbor nodes in sensor networks is a challenging problem due to the unsuitability of asymmetric key crypt...
Haowen Chan, Adrian Perrig
ISI
2005
Springer
15 years 9 months ago
Performance Study of a Compiler/Hardware Approach to Embedded Systems Security
Abstract. Trusted software execution, prevention of code and data tampering, authentication, and providing a secure environment for software are some of the most important security...
Kripashankar Mohan, Bhagirath Narahari, Rahul Simh...
ITRUST
2005
Springer
15 years 9 months ago
Interactive Credential Negotiation for Stateful Business Processes
Business Processes for Web Services are the new paradigm for lightweight enterprise integration. They cross organizational boundaries, are provided by entities that see each other ...
Hristo Koshutanski, Fabio Massacci
126
Voted
HICSS
2002
IEEE
134views Biometrics» more  HICSS 2002»
15 years 8 months ago
Sense of Virtual Community-Maintaining the Experience of Belonging
E-commerce strategists advise companies to create virtual communities for their customers. But what is involved in establishing and maintaining virtual communities? This paper add...
Anita L. Blanchard, M. Lynne Markus