Sciweavers

8655 search results - page 72 / 1731
» Challenges for Trusted Computing
Sort
View
COMPUTER
2008
60views more  COMPUTER 2008»
13 years 9 months ago
Enabling Next-Generation RFID Applications: Solutions and Challenges
Quan Z. Sheng, Xue Li, Sherali Zeadally
COMPUTER
2007
102views more  COMPUTER 2007»
13 years 8 months ago
Challenges in Securing Networked J2ME Applications
André N. Klingsheim, Vebjørn Moen, K...
PERCOM
2009
ACM
14 years 9 months ago
DTT: A Distributed Trust Toolkit for Pervasive Systems
Effective security mechanisms are essential to the widespread deployment of pervasive systems. Much of the research focus on security in pervasive computing has revolved around dis...
Brent Lagesse, Mohan Kumar, Justin Mazzola Paluska...
CHI
2003
ACM
14 years 9 months ago
Interpersonal cues and consumer trust in e-commerce
E-commerce stretches interactions over space and time, and thus requires more trust than traditional shopping. Current approaches to building trust in e-commerce focus on cognitiv...
Jens Riegelsberger
CSE
2009
IEEE
14 years 3 months ago
Security and Trust through Electronic Social Network-Based Interactions
—The success of a Public Key Infrastructure such as the Web of Trust (WoT) heavily depends on its ability to ensure that public keys are used by their legitimate owners, thereby ...
Patrik Bichsel, Samuel Müller, Franz-Stefan P...