Sciweavers

1229 search results - page 87 / 246
» Trusted Computing
Sort
View
EDBT
2008
ACM
149views Database» more  EDBT 2008»
15 years 10 months ago
A probabilistic trust model for semantic peer to peer systems
Semantic peer to peer (P2P) systems are fully decentralized overlay networks of people or machines (called peers) sharing and searching varied resources (documents, videos, photos...
Gia Hien Nguyen, Philippe Chatalic, Marie-Christin...
ECAI
2008
Springer
14 years 11 months ago
A probabilistic trust model for semantic peer-to-peer systems
Semantic peer to peer (P2P) systems are fully decentralized overlay networks of people or machines (called peers) sharing and searching varied resources (documents, videos, photos...
Gia Hien Nguyen, Philippe Chatalic, Marie-Christin...
FOCS
2010
IEEE
14 years 8 months ago
Adaptive Hardness and Composable Security in the Plain Model from Standard Assumptions
We construct the first general secure computation protocols that require no trusted infrastructure other than authenticated communication, and that satisfy a meaningful notion of s...
Ran Canetti, Huijia Lin, Rafael Pass
ICISC
2008
126views Cryptology» more  ICISC 2008»
14 years 11 months ago
Essentially Optimal Universally Composable Oblivious Transfer
Oblivious transfer is one of the most important cryptographic primitives, both for theoretical and practical reasons and several protocols were proposed during the years. We provid...
Ivan Damgård, Jesper Buus Nielsen, Claudio O...
WCNC
2008
IEEE
15 years 4 months ago
On the Deployment of Mobile Trusted Modules
— In its recently published TCG Mobile Reference Architecture, the TCG Mobile Phone Work Group specifies a new concept to enable trust into future mobile devices. For this purpo...
Andreas U. Schmidt, Nicolai Kuntze, Michael Kasper