Sciweavers

1240 search results - page 96 / 248
» Trusted Design in FPGAs
Sort
View
IJACTAICIT
2010
99views more  IJACTAICIT 2010»
14 years 4 months ago
Utilizing Trusted Platform Module to Mitigate Botnet Attacks
Ever since, internet banking came into existence it has been a bull's eye for the hackers. Up to date, several cases have been reported by internet banking users for missing ...
Muththolib Sidheeq, Ali Dehghantanha, Geetha Kanan...
MOBISYS
2009
ACM
15 years 10 months ago
SPATE: small-group PKI-less authenticated trust establishment
Establishing trust between a group of individuals remains a difficult problem. Prior works assume trusted infrastructure, require an individual to trust unknown entities, or provi...
Yue-Hsun Lin, Ahren Studer, Hsu-Chun Hsiao, Jonath...
CCS
2008
ACM
14 years 12 months ago
A security architecture for transient trust
In extraordinary situations, certain individuals may require access to information for which they are not normally authorized. For example, to facilitate rescue of people trapped ...
Cynthia E. Irvine, Timothy E. Levin, Paul C. Clark...
SIGMOD
2005
ACM
87views Database» more  SIGMOD 2005»
15 years 10 months ago
When Can We Trust Progress Estimators for SQL Queries?
The problem of estimating progress for long-running queries has recently been introduced. We analyze the characteristics of the progress estimation problem, from the perspective o...
Surajit Chaudhuri, Raghav Kaushik, Ravishankar Ram...
ITRUST
2005
Springer
15 years 3 months ago
Security and Trust in the Italian Legal Digital Signature Framework
Abstract. The early adoption of a national, legal digital signature framework in Italy has brought forth a series of problems and vulnerabilities. In this paper we describe each of...
Stefano Zanero