Sciweavers

8655 search results - page 301 / 1731
» Challenges for Trusted Computing
Sort
View
141
Voted
CCGRID
2005
IEEE
15 years 9 months ago
Enabling technologies for future learning scenarios: the semantic grid for human learning
In this paper, starting from the limitations and constrains of traditional human learning approaches, we outline new suitable approaches to education and training in future knowle...
Angelo Gaeta, Pierluigi Ritrovato, Francesco Orciu...
NDSS
1999
IEEE
15 years 7 months ago
Addressing the Problem of Undetected Signature Key Compromise
Suppose that messages have been signed using a user's signature private key during the period of time after a key compromise but before the compromise is detected. This is a ...
Mike Just, Paul C. van Oorschot
HUC
1999
Springer
15 years 7 months ago
The Role of Connectivity in Supporting Context-Sensitive Applications
This paper considers the role of network connectivity in supporting context-sensitive applications. A range of context-sensitive applications are analysed with respect to connectiv...
Keith Cheverst, Nigel Davies, Keith Mitchell, Adri...
SP
1998
IEEE
15 years 7 months ago
Stack and Queue Integrity on Hostile Platforms
When computationally intensive tasks have to be carried out on trusted, but limited, platforms such as smart cards, it becomes necessary to compensate for the limited resources me...
Premkumar T. Devanbu, Stuart G. Stubblebine
AGENTS
1997
Springer
15 years 7 months ago
Software Agents and User Autonomy
: Software agents comprise a new area for research and soon will be embedded and ubiquitous in modern computing systems. In this formative phase, it is important to develop compreh...
Batya Friedman, Helen Nissenbaum