Sciweavers

1229 search results - page 80 / 246
» Trusted Computing
Sort
View
NDSS
2009
IEEE
15 years 4 months ago
Two-Party Computation Model for Privacy-Preserving Queries over Distributed Databases
Many existing privacy-preserving techniques for querying distributed databases of sensitive information do not scale for large databases due to the use of heavyweight cryptographi...
Sherman S. M. Chow, Jie-Han Lee, Lakshminarayanan ...
DBSEC
2003
113views Database» more  DBSEC 2003»
14 years 11 months ago
ECPV: Efficient Certificate Path Validation in Public-key Infrastructure
In the current public-key infrastructure (PKI) schemes based on X.509, a relying party must validate a user’s certificate as well as the existence of a path from its trust point...
Mahantesh Halappanavar, Ravi Mukkamala
WMCSA
2008
IEEE
15 years 4 months ago
Location-based trust for mobile user-generated content: applications, challenges and implementations
The recent explosion in shared media content and sensed data produced by mobile end-users is challenging well-established principles and assumptions in data trust models. A fundam...
Vincent Lenders, Emmanouil Koukoumidis, Pei Zhang,...
ICCS
2004
Springer
15 years 3 months ago
Trusted Group Membership Service for JXTA
This paper presents Group Membership Service for JXTA extended with single or bi-directional authentication. The proposed solution exploits certificates and PKI (Public Key Infrast...
Lukasz Kawulok, Krzysztof Zielinski, Michal Jaesch...
AIPS
2010
15 years 7 days ago
When Policies Can Be Trusted: Analyzing a Criteria to Identify Optimal Policies in MDPs with Unknown Model Parameters
Computing a good policy in stochastic uncertain environments with unknown dynamics and reward model parameters is a challenging task. In a number of domains, ranging from space ro...
Emma Brunskill