Sciweavers

8655 search results - page 132 / 1731
» Challenges for Trusted Computing
Sort
View
120
Voted
CHI
2007
ACM
16 years 2 months ago
Multiview: improving trust in group video conferencing through spatial faithfulness
Video conferencing is still considered a poor alternative to face-to-face meetings. In the business setting, where these systems are most prevalent, the misuse of video conferenci...
David T. Nguyen, John Canny
190
Voted
CMS
2011
229views Communications» more  CMS 2011»
14 years 2 months ago
Twin Clouds: Secure Cloud Computing with Low Latency - (Full Version)
Abstract. Cloud computing promises a cost effective enabling technology to outsource storage and massively parallel computations. However, existing approaches for provably secure ...
Sven Bugiel, Stefan Nürnberger, Ahmad-Reza Sa...
109
Voted
AINA
2007
IEEE
15 years 9 months ago
Random Oracle Instantiation in Distributed Protocols Using Trusted Platform Modules
The random oracle model is an idealized theoretical model that has been successfully used for designing many cryptographic algorithms and protocols. Unfortunately, a series of res...
Vandana Gunupudi, Stephen R. Tate
118
Voted
AINA
2006
IEEE
15 years 8 months ago
Remote Trust with Aspect-Oriented Programming
Given a client/server application, how can the server entrust the integrity of the remote client, albeit the latter is running on an un-trusted machine? To address this research p...
Paolo Falcarin, Riccardo Scandariato, Mario Baldi
99
Voted
COMPUTER
2004
120views more  COMPUTER 2004»
15 years 2 months ago
Computer Security in the Real World
After thirty years of work on computer security, why are almost all the systems in service today extremely vulnerable to attack? The main reason is that security is expensive to s...
Butler W. Lampson