Sciweavers

3299 search results - page 108 / 660
» Privacy and Trusted Computing
Sort
View
JUCS
2010
82views more  JUCS 2010»
14 years 11 months ago
Trusted Computing
Peter Lipp
TJS
2011
71views more  TJS 2011»
14 years 11 months ago
Automatically constructing trusted cluster computing environment
Yongwei Wu, Chen Gang, Jia Liu, Rui Fang, Xiaomeng...
PUC
2000
122views more  PUC 2000»
15 years 4 months ago
Disseminating Trust Information in Wearable Communities
: This paper describes a framework for managing and distributing trust information in a community of mobile and wearable computer users. Trust information in the form of reputation...
Jay Schneider, Gerd Kortuem, Joe Jager, Stephen Fi...
ICPADS
2007
IEEE
15 years 10 months ago
Statistical trust establishment in wireless sensor networks
Abstract— We present a new distributed approach that establishes reputation-based trust among sensor nodes in order to identify malfunctioning and malicious sensor nodes and mini...
Matthew J. Probst, Sneha Kumar Kasera
157
Voted
NBIS
2007
Springer
15 years 10 months ago
Trust Model for Mobile Devices in Ubiquitous Environment
In ubiquitous computing environment, people carrying their mobile devices (eg., mobile phone, PDA, embedded devices) expect to access locally hosted services or resources anytime, ...
Zhefan Jiang, Sangwook Kim