Sciweavers

8243 search results - page 129 / 1649
» Can We Manage Trust
Sort
View
ACSAC
2004
IEEE
14 years 1 months ago
Open-Source Applications of TCPA Hardware
How can Alice trust computation occurring at Bob's computer? Since it exists and is becoming ubiquitous, the current-generation TCPA/TCG hardware might enable a solution. Whe...
John Marchesini, Sean W. Smith, Omen Wild, Joshua ...
ACSAC
2001
IEEE
14 years 1 months ago
Securing Web Servers against Insider Attack
Too often, "security of Web transactions" reduces to "encryption of the channel"--and neglects to address what happens at the server on the other end. This ove...
Shan Jiang, Sean W. Smith, Kazuhiro Minami
ISCC
2005
IEEE
14 years 3 months ago
Towards Flexible Authorization Management
During the last years there have been a lot of proposals in the literature for systems that attempt to manage the process of trust establishment. However, the engineering details ...
Patroklos G. Argyroudis, Donal O'Mahony
MOBICOM
2006
ACM
14 years 4 months ago
An identity-based security framework For VANETs
We present a security framework for Vehicular Ad hoc Networks (VANETs), using identity-based cryptography, to provide authentication, confidentiality, non-repudiation and message...
Pandurang Kamat, Arati Baliga, Wade Trappe
IEPOL
2006
75views more  IEPOL 2006»
13 years 10 months ago
Collusion without communication
Tacit cartels did not arise in experimental triopoly markets even with the help of detailed instructions to prospective cartel members on how to coordinate actions. In duopoly mar...
Astri Muren, Roger Pyddoke