Sciweavers

262 search results - page 10 / 53
» Providing Trusted Components to the Industry
Sort
View
78
Voted
WPES
2005
ACM
15 years 3 months ago
Privacy for RFID through trusted computing
Radio Frequency Identification (RFID) technology raises significant privacy issues because it enables tracking of items and people possibly without their knowledge or consent. O...
David Molnar, Andrea Soppera, David Wagner
CSEE
2000
Springer
15 years 1 months ago
A Case Study Approach to Teaching Component Based Software Engineering
The field of component-based software engineering (CBSE) is currently in a period of rapid growth and change. No longer is the field dominated by discussions of traditional kinds ...
Allen S. Parrish, Brandon Dixon, David P. Hale, Jo...
WORDS
2005
IEEE
15 years 3 months ago
Towards a Dependable Component Technology for Embedded System Applications
Component-based software engineering is a technique that has proven effective to increase reusability and efficiency in development of office and web applications. Though being ...
Mikael Åkerholm, Anders Möller, Hans Ha...
TRUST
2010
Springer
15 years 2 months ago
Token-Based Cloud Computing
Secure outsourcing of computation to an untrusted (cloud) service provider is becoming more and more important. Pure cryptographic solutions based on fully homomorphic and verifia...
Ahmad-Reza Sadeghi, Thomas Schneider 0003, Marcel ...
CSFW
1999
IEEE
15 years 1 months ago
Secure Composition of Insecure Components
Software systems are becoming heterogeneous: instead of a small number of large programs from well-established sources, a user's desktop may now consist of many smaller compo...
Peter Sewell, Jan Vitek