Sciweavers

3299 search results - page 543 / 660
» Privacy and Trusted Computing
Sort
View
OOPSLA
2005
Springer
15 years 9 months ago
Inferring context-free grammars for domain-specific languages
Grammatical inference (or grammar inference) has been applied to various problems in areas such as computational biology, and speech and pattern recognition but its application to...
Faizan Javed
SAFECOMP
2005
Springer
15 years 9 months ago
Public-Key Cryptography and Availability
When the safety community designs their systems to also maintain security properties, it is likely that public-key encryption will be among the tools that are applied. The security...
Tage Stabell-Kulø, Simone Lupetti
SIGOPSE
2004
ACM
15 years 9 months ago
Eluding carnivores: file sharing with strong anonymity
Anonymity is increasingly important for networked applications amidst concerns over censorship and privacy. This paper outlines the design of HerbivoreFS, a scalable and efficien...
Emin Gün Sirer, Sharad Goel, Mark Robson, Dog...
ATAL
2004
Springer
15 years 9 months ago
On Safe Kernel Stable Coalition Forming among Agents
We investigate and discuss safety and privacy preserving properties of a game-theortic based coalition algorithm KCA for forming kernel stable coalitions among information agents ...
Bastian Blankenburg, Matthias Klusch
135
Voted
MATA
2004
Springer
113views Communications» more  MATA 2004»
15 years 9 months ago
PEARL: A PErformance evaluAtor of cRyptographic aLgorithms for Mobile Devices
Abstract. Limited computational power imposes new challenges during the implementation of security and privacy solutions for mobile devices. The choice for the most appropriate cry...
José Bringel Filho, Windson Viana, Rossana ...