Sciweavers

5476 search results - page 15 / 1096
» Resettably Secure Computation
Sort
View
71
Voted
COMPUTER
1998
75views more  COMPUTER 1998»
15 years 1 months ago
Security Control for COTS Components
Qun Zhong, Nigel Edwards
106
Voted
JUCS
2010
114views more  JUCS 2010»
14 years 8 months ago
On Reliable Platform Configuration Change Reporting Mechanisms for Trusted Computing Enabled Platforms
: One of the most important use-cases of Trusted Computing is Remote Attestation. It allows platforms to get a trustworthy proof of the loaded software and current configuration of...
Kurt Dietrich
144
Voted
JCS
2011
156views more  JCS 2011»
14 years 8 months ago
Securing low-cost RFID systems: An unconditionally secure approach
We explore a new direction towards solving the identity authentication problem in RFID systems. We break the RFID authentication process into two main problems: message authenticat...
Basel Alomair, Loukas Lazos, Radha Poovendran
132
Voted
SP
2002
IEEE
144views Security Privacy» more  SP 2002»
15 years 1 months ago
ARMS: An agent-based resource management system for grid computing
provide a scalable and adaptable abstraction of the system architecture. Each agent is able to cooperate with other agents and thereby provide service advertisement and discovery f...
Junwei Cao, Stephen A. Jarvis, Subhash Saini
SP
2010
IEEE
176views Security Privacy» more  SP 2010»
15 years 8 days ago
State-of-the-art in heterogeneous computing
Node level heterogeneous architectures have become attractive during the last decade for several reasons: compared to traditional symmetric CPUs, they offer high peak performance a...
André Rigland Brodtkorb, Christopher Dyken,...