Sciweavers

344 search results - page 57 / 69
» trust 2009
Sort
View
DEXAW
2009
IEEE
129views Database» more  DEXAW 2009»
15 years 1 months ago
Towards a Generic Process for Security Pattern Integration
Abstract--Interdependencies between different security patterns can influence the properties of a particular pattern when applied in conjunction with other patterns. The resulting ...
Andreas Fuchs, Sigrid Gürgens, Carsten Rudolp...
111
Voted
DSN
2009
IEEE
15 years 1 months ago
HC-BGP: A light-weight and flexible scheme for securing prefix ownership
The Border Gateway Protocol (BGP) is a fundamental building block of the Internet infrastructure. However, due to the implicit trust assumption among networks, Internet routing re...
Ying Zhang, Zheng Zhang, Zhuoqing Morley Mao, Y. C...
84
Voted
GLOBECOM
2009
IEEE
15 years 1 months ago
Restarting Particle Filters: An Approach to Improve the Performance of Dynamic Indoor Localization
Particle filters have been found to be effective in tracking mobile targets in indoor environments. One frequently encountered problem in these settings occurs when the target'...
Begumhan Turgut, Richard P. Martin
CISC
2009
Springer
148views Cryptology» more  CISC 2009»
14 years 7 months ago
A DAA Scheme Requiring Less TPM Resources
Abstract. Direct anonymous attestation (DAA) is a special digital signature primitive, which provides a balance between signer authentication and privacy. One of the most interesti...
Liqun Chen
80
Voted
DRR
2009
14 years 7 months ago
Using synthetic data safely in classification
When is it safe to use synthetic data in supervised classification? Trainable classifier technologies require large representative training sets consisting of samples labeled with...
Jean Nonnemaker, Henry Baird