Sciweavers

1229 search results - page 104 / 246
» Trusted Computing
Sort
View
FC
2001
Springer
123views Cryptology» more  FC 2001»
15 years 2 months ago
Optimistic Fair Exchange with Transparent Signature Recovery
In this paper, we propose a new practical fair exchange protocol allowing the exchange of an electronic item against a signature. The protocol is based on the Guillou-Quisquater s...
Olivier Markowitch, Shahrokh Saeednia
WIMOB
2008
IEEE
15 years 4 months ago
A Protocol for Pervasive Distributed Computing Reliability
Abstract—The adoption of new hardware and software architectures will make future generations of pervasive devices more flexible and extensible. Networks of computational nodes ...
Alberto Ferrante, Roberto Pompei, Anastasia Stulov...
PDCAT
2005
Springer
15 years 3 months ago
Design of a Security Management Middleware in Ubiquitous Computing Environments
In this paper, we propose a security management middleware in ubiquitous computing environments. This security management should be applicationoriented security and provides user-...
Zhefan Jiang, Kanghee Lee, Sangok Kim, Hyunchul Ba...
NOMS
2006
IEEE
129views Communications» more  NOMS 2006»
15 years 4 months ago
A Framework for the Decentralisation and Management of Collaborative Applications in Ubiquitous Computing Environments
—When deploying collaborative applications such as Instant Messaging in ubiquitous computing environments significant enhancements can be afforded by offering additional context ...
Karl Quinn, Austin Kenny, Kevin Feeney, David Lewi...
ECAI
2006
Springer
15 years 1 months ago
Computational Opinions
Existing approaches to knowledge representation and reasoning in the context of open systems either deal with "objective" knowledge or with beliefs. In contrast, there ha...
Felix A. Fischer, Matthias Nickles