Sciweavers

8243 search results - page 144 / 1649
» Can We Manage Trust
Sort
View
PDP
2008
IEEE
14 years 4 months ago
CoDaMine: Communication Data Mining for Feedback and Control in Ubiquitous Environments
In ubiquitous environments an increasing number of sensors capture information on users and an increasing number of actuators present information to users. In this paper we presen...
Tom Gross, Mirko Fetter
DISCEX
2003
IEEE
14 years 3 months ago
Scaling Secure Group Communication Systems: Beyond Peer-to-Peer
This paper proposes several integrated security architecture designs for client-server group communication systems. In an integrated architecture, security services are implemente...
Yair Amir, Cristina Nita-Rotaru, Jonathan Robert S...
IPTPS
2004
Springer
14 years 3 months ago
DHT Routing Using Social Links
— The equality and anonymity of peer-to-peer networks makes them vulnerable to routing denial of service attacks from misbehaving nodes. In this paper, we investigate how existin...
Sergio Marti, Prasanna Ganesan, Hector Garcia-Moli...
IFIP
2010
Springer
13 years 5 months ago
A Formal Analysis of Authentication in the TPM
The Trusted Platform Module (TPM) is a hardware chip designed to enable computers to achieve a greater level of security than is possible in software alone. To this end, the TPM pr...
Stéphanie Delaune, Steve Kremer, Mark Dermo...
HICSS
2005
IEEE
133views Biometrics» more  HICSS 2005»
14 years 3 months ago
Strategic Integration: A Knowledge Management Approach to Crisis Management
Every day, businesses are threatened by crises that could have been prevented or their impact lessened if only knowledge of causal and influencing factors were known and better ma...
Wei-Tsong Wang, Salvatore Belardo