Sciweavers

3299 search results - page 155 / 660
» Privacy and Trusted Computing
Sort
View
162
Voted
CCS
2010
ACM
15 years 5 months ago
Security analysis of India's electronic voting machines
Elections in India are conducted almost exclusively using electronic voting machines developed over the past two decades by a pair of government-owned companies. These devices, kn...
Scott Wolchok, Eric Wustrow, J. Alex Halderman, Ha...
122
Voted
WOWMOM
2006
ACM
119views Multimedia» more  WOWMOM 2006»
15 years 11 months ago
Credentials and Beliefs in Remote Trusted Platforms Attestation
— Remote attestation in trusted computing is about the ability of a local platform to authenticate the hardware and the software stack running on a remote trusted platform. We sa...
Andrea Bottoni, Gianluca Dini, Evangelos Kranakis
104
Voted
IJCAI
2007
15 years 6 months ago
Extracting and Visualizing Trust Relationships from Online Auction Feedback Comments
Buyers and sellers in online auctions are faced with the task of deciding who to entrust their business to based on a very limited amount of information. Current trust ratings on ...
John O'Donovan, Barry Smyth, Vesile Evrim, Dennis ...
FORTE
2004
15 years 6 months ago
A Logical Account of NGSCB
Abstract. As its name indicates, NGSCB aims to be the "Next-Generation Secure Computing Base". As envisioned in the context of Trusted Computing initiatives, NGSCB provid...
Martín Abadi, Ted Wobber
125
Voted
CCR
2010
104views more  CCR 2010»
15 years 2 months ago
I know what you will do next summer
This is a brief journey across the Internet privacy landscape. After trying to convince you about the importance of the problem I will try to present questions of interest and how...
Balachander Krishnamurthy