Sciweavers

1240 search results - page 94 / 248
» Trusted Design in FPGAs
Sort
View
HPCC
2007
Springer
15 years 4 months ago
Maximum-Objective-Trust Clustering Solution and Analysis in Mobile Ad Hoc Networks
In mobile-AdHoc networks (MANETs), many applications need the support of layer-structure. Clustering solution is the most widely used layerstructure and the choosing of clusterhead...
Qiang Zhang, Guangming Hu, Zhenghu Gong
SIGCPR
2006
ACM
346views Hardware» more  SIGCPR 2006»
15 years 4 months ago
An extension of the UTAUT model with e-quality, trust, and satisfaction constructs
This research seeks to validate a comprehensive model of quality in the context of e-business systems. It also extends the UTAUT model with e-quality, trust, and satisfaction cons...
Erin Cody-Allen, Rajiv Kishore
EUROPKI
2004
Springer
15 years 3 months ago
Filling the Gap between Requirements Engineering and Public Key/Trust Management Infrastructures
The last years have seen a major interest in designing and deploying trust management and public key infrastructures. Yet, it is still far from clear how one can pass from the orga...
Paolo Giorgini, Fabio Massacci, John Mylopoulos, N...
IMCSIT
2010
14 years 8 months ago
Trusted Data in IBM's MDM: Accuracy Dimension
A good data model designed for e-Commerce or e-Government has little value if it lacks accurate, up-to-date data [22]. In this paper data quality measures, its processing and maint...
Przemyslaw Pawluk
SECURWARE
2008
IEEE
15 years 4 months ago
Enhancing Trusted Platform Modules with Hardware-Based Virtualization Techniques
—We present the design of a trusted platform module (TPM) that supports hardware-based virtualization techniques. Our approach enables multiple virtual machines to use the comple...
Frederic Stumpf, Claudia Eckert