Sciweavers

3299 search results - page 4 / 660
» Privacy and Trusted Computing
Sort
View
TRUST
2010
Springer
15 years 3 months ago
Software on the Witness Stand: What Should It Take for Us to Trust It?
Sergey Bratus, Ashlyn Lembree, Anna Shubina
TRUST
2010
Springer
15 years 4 months ago
Lagrangian E-Voting: Verifiability on Demand and Strong Privacy
Lukasz Krzywiecki, Miroslaw Kutylowski
ISPEC
2007
Springer
15 years 5 months ago
Privacy-Preserving Credentials Upon Trusted Computing Augmented Servers
Credentials are an indispensable means for service access control in electronic commerce. However, regular credentials such as X.509 certificates and SPKI/SDSI certificates do no...
Yanjiang Yang, Robert H. Deng, Feng Bao
TRUST
2010
Springer
14 years 10 months ago
Escrowed Data and the Digital Envelope
King Ables, Mark D. Ryan
DEXAW
2002
IEEE
84views Database» more  DEXAW 2002»
15 years 4 months ago
Privacy of Trust in Similarity Estimation through Secure Computations
Javier Carbo Rubiera, José M. Molina L&oacu...