Sciweavers

1240 search results - page 114 / 248
» Trusted Design in FPGAs
Sort
View
IJNSEC
2007
137views more  IJNSEC 2007»
14 years 10 months ago
An FPGA-based AES-CCM Crypto Core For IEEE 802.11i Architecture
The widespread adoption of IEEE 802.11 wireless networks has brought its security paradigm under active research. One of the important research areas in this field is the realiza...
Arshad Aziz, Nassar Ikram
ACMICEC
2006
ACM
142views ECommerce» more  ACMICEC 2006»
15 years 4 months ago
Trusting advice from other buyers in e-marketplaces: the problem of unfair ratings
In electronic marketplaces populated by self-interested agents, buyer agents would benefit by modeling the reputation of seller agents, in order to make effective decisions abou...
Jie Zhang, Robin Cohen
IWIPS
2004
80views Business» more  IWIPS 2004»
14 years 11 months ago
Website Design and Culture: An Empirical Investigation
Understanding website preferences across cultures is imperative to the development of customer loyalty in online environments. Based on an exploratory four nation study, this pape...
Dianne Cyr, Joe Ilsever, Carole Bonanni, John Bowe...
CCS
2008
ACM
15 years 3 days ago
Towards an efficient and language-agnostic compliance checker for trust negotiation systems
To ensure that a trust negotiation succeeds whenever possible, authorization policy compliance checkers must be able to find all minimal sets of their owners' credentials tha...
Adam J. Lee, Marianne Winslett
COMSNETS
2012
222views more  COMSNETS 2012»
13 years 5 months ago
Assessing the veracity of identity assertions via OSNs
Anonymity is one of the main virtues of the Internet, as it protects privacy and enables users to express opinions more freely. However, anonymity hinders the assessment of the ve...
Michael Sirivianos, Kyungbaek Kim, Jian Wei Gan, X...