Sciweavers

242 search results - page 17 / 49
» Private Information Retrieval Using Trusted Hardware
Sort
View
ATAL
2007
Springer
15 years 3 months ago
Rumours and reputation: evaluating multi-dimensional trust within a decentralised reputation system
In this paper we develop a novel probabilistic model of computational trust that explicitly deals with correlated multi-dimensional contracts. Our starting point is to consider an...
Steven Reece, Alex Rogers, Stephen Roberts, Nichol...
83
Voted
NSPW
2004
ACM
15 years 2 months ago
Property-based attestation for computing platforms: caring about properties, not mechanisms
Over the past years, the computing industry has started various initiatives announced to increase computer security by means of new hardware architectures. The most notable effort...
Ahmad-Reza Sadeghi, Christian Stüble
DATE
2010
IEEE
182views Hardware» more  DATE 2010»
15 years 2 months ago
Fault-based attack of RSA authentication
For any computing system to be secure, both hardware and software have to be trusted. If the hardware layer in a secure system is compromised, not only it would be possible to ext...
Andrea Pellegrini, Valeria Bertacco, Todd M. Austi...
CMS
2011
229views Communications» more  CMS 2011»
13 years 9 months ago
Twin Clouds: Secure Cloud Computing with Low Latency - (Full Version)
Abstract. Cloud computing promises a cost effective enabling technology to outsource storage and massively parallel computations. However, existing approaches for provably secure ...
Sven Bugiel, Stefan Nürnberger, Ahmad-Reza Sa...
SAC
2006
ACM
15 years 3 months ago
Trust-enhanced visibility for personalized document recommendations
Documents are recommended by computer-based systems normally according to their prominence in the document reference network. Based on the requirements identified in a concrete u...
Claudia Hess, Klaus Stein, Christoph Schlieder