Sciweavers

1240 search results - page 104 / 248
» Trusted Design in FPGAs
Sort
View
INTERACT
2003
14 years 11 months ago
Human and Humanoid Don't Match: Consistency Preference and Impact on Users' Trust
Abstract: For many anthropomorphic representations on computer interfaces, there are choices of using mediacaptured human components and using computer-synthesized humanoid counter...
Li Gong
CORR
2010
Springer
432views Education» more  CORR 2010»
14 years 10 months ago
A Distributed Trust Management Framework for Detecting Malicious Packet Dropping Nodes in a Mobile Ad Hoc Network
In a multi-hop mobile ad hoc network (MANET) mobile nodes communicate with each other forming a cooperative radio network. Security remains a major challenge for these networks du...
Jaydip Sen
IJNSEC
2011
272views more  IJNSEC 2011»
14 years 5 months ago
Trust Key Management Scheme for Wireless Body Area Networks
With recent advances in wireless sensor networks and embedded computing technologies, miniaturized pervasive health monitoring devices have become practically feasible. In additio...
Mohammed Mana, Mohammed Feham, Boucif Amar Bensabe...
CCS
2004
ACM
15 years 3 months ago
Lessons learned using alloy to formally specify MLS-PCA trusted security architecture
In order to solve future Multi Level Security (MLS) problems, we have developed a solution based on the DARPA Polymorphous Computing Architecture (PCA). MLS-PCA uses a novel distr...
Brant Hashii
ICSOC
2004
Springer
15 years 3 months ago
Toward autonomic web services trust and selection
Emerging Web services standards enable the development of large-scale applications in open environments. In particular, they enable services to be dynamically bound. However, curr...
E. Michael Maximilien, Munindar P. Singh