Sciweavers

947 search results - page 161 / 190
» HMM-Based Trust Model
Sort
View
83
Voted
CISC
2009
Springer
148views Cryptology» more  CISC 2009»
14 years 10 months ago
A DAA Scheme Requiring Less TPM Resources
Abstract. Direct anonymous attestation (DAA) is a special digital signature primitive, which provides a balance between signer authentication and privacy. One of the most interesti...
Liqun Chen
115
Voted
DEBU
2010
127views more  DEBU 2010»
14 years 10 months ago
Provenance in ORCHESTRA
Sharing structured data today requires agreeing on a standard schema, then mapping and cleaning all of the data to achieve a single queriable mediated instance. However, for setti...
Todd J. Green, Grigoris Karvounarakis, Zachary G. ...
135
Voted
AIM
2002
15 years 11 days ago
Computational Vulnerability Analysis for Information Survivability
The Infrastructure of modern society is controlled by software systems. These systems are vulnerable to attacks; several such attacks, launched by "recreation hackers" h...
Howard E. Shrobe
92
Voted
PKC
2009
Springer
121views Cryptology» more  PKC 2009»
16 years 1 months ago
On the Theory and Practice of Personal Digital Signatures
We take a step towards a more realistic modeling of personal digital signatures, where a human user, his mobile equipment, his PC and a server are all considered as independent pla...
Gert Læssøe Mikkelsen, Ivan Damg&arin...
96
Voted
CHI
2008
ACM
16 years 27 days ago
The effects of semantic grouping on visual search
This paper reports on work-in-progress to better understand how users visually interact with hierarchically organized semantic information. Experimental reaction time and eye move...
Tim Halverson, Anthony J. Hornof