Sciweavers

947 search results - page 161 / 190
» HMM-Based Trust Model
Sort
View
CISC
2009
Springer
148views Cryptology» more  CISC 2009»
15 years 2 months ago
A DAA Scheme Requiring Less TPM Resources
Abstract. Direct anonymous attestation (DAA) is a special digital signature primitive, which provides a balance between signer authentication and privacy. One of the most interesti...
Liqun Chen
DEBU
2010
127views more  DEBU 2010»
15 years 2 months ago
Provenance in ORCHESTRA
Sharing structured data today requires agreeing on a standard schema, then mapping and cleaning all of the data to achieve a single queriable mediated instance. However, for setti...
Todd J. Green, Grigoris Karvounarakis, Zachary G. ...
AIM
2002
15 years 4 months ago
Computational Vulnerability Analysis for Information Survivability
The Infrastructure of modern society is controlled by software systems. These systems are vulnerable to attacks; several such attacks, launched by "recreation hackers" h...
Howard E. Shrobe
132
Voted
PKC
2009
Springer
121views Cryptology» more  PKC 2009»
16 years 5 months ago
On the Theory and Practice of Personal Digital Signatures
We take a step towards a more realistic modeling of personal digital signatures, where a human user, his mobile equipment, his PC and a server are all considered as independent pla...
Gert Læssøe Mikkelsen, Ivan Damg&arin...
CHI
2008
ACM
16 years 5 months ago
The effects of semantic grouping on visual search
This paper reports on work-in-progress to better understand how users visually interact with hierarchically organized semantic information. Experimental reaction time and eye move...
Tim Halverson, Anthony J. Hornof