Sciweavers

8655 search results - page 352 / 1731
» Challenges for Trusted Computing
Sort
View
110
Voted
DIMVA
2010
15 years 5 months ago
Conqueror: Tamper-Proof Code Execution on Legacy Systems
We present Conqueror, a software-based attestation scheme for tamper-proof code execution on untrusted legacy systems. Beside providing load-time attestation of a piece of code, Co...
Lorenzo Martignoni, Roberto Paleari, Danilo Brusch...
128
Voted
MEDIAFORENSICS
2010
15 years 5 months ago
Image forensic analyses that elude the human visual system
While historically we may have been overly trusting of photographs, in recent years there has been a backlash of sorts and the authenticity of photographs is now routinely questio...
Hany Farid, Mary J. Bravo
147
Voted
DBSEC
2009
124views Database» more  DBSEC 2009»
15 years 4 months ago
Towards System Integrity Protection with Graph-Based Policy Analysis
Abstract. Identifying and protecting the trusted computing base (TCB) of a system is an important task, which is typically performed by designing and enforcing a system security po...
Wenjuan Xu, Xinwen Zhang, Gail-Joon Ahn
134
Voted
IJISEC
2006
108views more  IJISEC 2006»
15 years 3 months ago
How to obtain full privacy in auctions
Abstract Privacy has become a factor of increasing importance in auction design. We propose general techniques for cryptographic first-price and (M + 1)st-price auction protocols t...
Felix Brandt
127
Voted
TWC
2008
129views more  TWC 2008»
15 years 3 months ago
An Efficient Mobile Authentication Scheme for Wireless Networks
In this paper, an efficient authentication scheme is proposed which is suitable for low-power mobile devices. It uses an elliptic-curve-cryptosystem based trust delegation mechanis...
Caimu Tang, Dapeng Oliver Wu