Sciweavers

8655 search results - page 347 / 1731
» Challenges for Trusted Computing
Sort
View
121
Voted
IEEEIAS
2008
IEEE
15 years 10 months ago
A Device Management Framework for Secure Ubiquitous Service Delivery
In a mobile ubiquitous environment, service interactions between a user device and a service provider should be secure, regardless of the type of device used to access or consume ...
Adrian Leung, Chris J. Mitchell
108
Voted
P2P
2008
IEEE
15 years 10 months ago
Transaction Rate Limiters for Peer-to-Peer Systems
We introduce transaction rate limiters, new mechanisms that limit (probabilistically) the maximum number of transactions a user of a peer-to-peer system can do in any given period...
Marcos Kawazoe Aguilera, Mark Lillibridge, Xiaozho...
99
Voted
WIMOB
2008
IEEE
15 years 10 months ago
Random Beacon for Privacy and Group Security
Abstract—Most contemporary security mechanisms and protocols include exchange of random or time-variant nonces as an essential means of protection against replay and other threat...
Aleksi Saarela, Jan-Erik Ekberg, Kaisa Nyberg
112
Voted
COLCOM
2007
IEEE
15 years 10 months ago
Countering feedback sparsity and manipulation in reputation systems
—Reputation systems provide a promising way for building trust through social control in collaborative communities by harnessing the community knowledge in the form of feedback. ...
Li Xiong, Ling Liu, Mustaque Ahamad
94
Voted
ISCC
2007
IEEE
15 years 10 months ago
Gaining Flexibility by Security Protocol Transfer
Even though PDAs in general—but smartcards in particular—can be trusted to keep secrets, because they have meager resources, including them in security protocols is difficult...
Per Harald Myrvang, Tage Stabell-Kulø