Sciweavers

6907 search results - page 109 / 1382
» Securing distributed adaptation
Sort
View
SIGOPSE
2004
ACM
15 years 3 months ago
Secure bootstrap is not enough: shoring up the trusted computing base
We propose augmenting secure boot with a mechanism to protect against compromises to field-upgradeable devices. In particular, secure boot standards should verify the firmware o...
James Hendricks, Leendert van Doorn
EUROCRYPT
2001
Springer
15 years 2 months ago
A Secure Three-Move Blind Signature Scheme for Polynomially Many Signatures
Abstract. Known practical blind signature schemes whose security against adaptive and parallel attacks can be proven in the random oracle model either need five data exchanges bet...
Masayuki Abe
CCS
2009
ACM
15 years 10 months ago
Hidden credential retrieval from a reusable password
We revisit the venerable question of access credentials management, which concerns the techniques that we, humans with limited memory, must employ to safeguard our various access ...
Xavier Boyen
COOPIS
2004
IEEE
15 years 1 months ago
Dynamic Access Control for Ubiquitous Environments
Current ubiquitous computing environments provide many kinds of information. This information may be accessed by different users under varying conditions depending on various conte...
Jehan Wickramasuriya, Nalini Venkatasubramanian
AXMEDIS
2006
IEEE
215views Multimedia» more  AXMEDIS 2006»
15 years 4 months ago
Distributed Architectures for High Performance and Privacy-Aware Content Generation and Delivery
The increasing heterogeneity of mobile client devices used to access the Web requires run-time adaptations of the Web contents. A significant trend in these content adaptation se...
Claudia Canali, Michele Colajanni, Riccardo Lancel...