Sciweavers

8655 search results - page 354 / 1731
» Challenges for Trusted Computing
Sort
View
104
Voted
NSDI
2008
15 years 6 months ago
A User Study Design for Comparing the Security of Registration Protocols
We present the design of a user study for comparing the security of two registration mechanisms for initializing credentials in machine authentication protocols, such as SiteKey. ...
Chris Karlof, J. Doug Tygar, David Wagner
133
Voted
ACMIDC
2008
15 years 5 months ago
Supporting parent-child interaction in divorced families
Divorce affects a significant number of children and parents. In this work, I discuss the challenges that these families may face and present two systems that may help address som...
Svetlana Yarosh
130
Voted
AINA
2006
IEEE
15 years 9 months ago
Tree-Based Group Key Agreement Framework for Mobile Ad-Hoc Networks
Design of protocols for mobile ad-hoc networks (MANETs) is generally tricky compared to wired networks, because on the one hand the increased communication constraints given by th...
Lijun Liao, Mark Manulis
124
Voted
ACSAC
2001
IEEE
15 years 7 months ago
Privacy-Preserving Cooperative Statistical Analysis
The growth of the Internet opens up tremendous opportunities for cooperative computation, where the answer depends on the private inputs of separate entities. Sometimes these comp...
Wenliang Du, Mikhail J. Atallah
133
Voted
CIE
2007
Springer
15 years 10 months ago
From Logic to Physics: How the Meaning of Computation Changed over Time
The intuition guiding the de…nition of computation has shifted over time, a process that is re‡ected in the changing formulations of the Church-Turing thesis. The theory of co...
Itamar Pitowsky