Sciweavers

8655 search results - page 302 / 1731
» Challenges for Trusted Computing
Sort
View
141
Voted
DCOSS
2007
Springer
15 years 7 months ago
Efficient and Distributed Access Control for Sensor Networks
Sensor networks are often used to sense the physical world and provide observations for various uses. In hostile environments, it is critical to control the network access to ensur...
Donggang Liu
132
Voted
DAC
2006
ACM
15 years 7 months ago
IMPRES: integrated monitoring for processor reliability and security
Security and reliability in processor based systems are concerns requiring adroit solutions. Security is often compromised by code injection attacks, jeopardizing even `trusted so...
Roshan G. Ragel, Sri Parameswaran
111
Voted
CARDIS
2010
Springer
162views Hardware» more  CARDIS 2010»
15 years 6 months ago
On the Design and Implementation of an Efficient DAA Scheme
Abstract. Direct Anonymous Attestation (DAA) is an anonymous digital signature scheme that aims to provide both signer authentication and privacy. One of the properties that makes ...
Liqun Chen, Dan Page, Nigel P. Smart
CSE
2009
IEEE
15 years 6 months ago
Socially Enhanced Network Address Translation
—The rapid evolution of the Internet has forced the use of Network Address Translation (NAT) to help slow the decline of publicly available IPv4 address space. While NAT provides...
Alexis Malozemoff, Muthucumaru Maheswaran
ACMDIS
2008
ACM
15 years 5 months ago
Games for virtual team building
Distributed teams are increasingly common in today's workplace. For these teams, face-to-face meetings where members can most easily build trust are rare and often cost-prohi...
Jason B. Ellis, Kurt Luther, Katherine Bessi&egrav...