Sciweavers

24529 search results - page 139 / 4906
» Computing on Authenticated Data
Sort
View
117
Voted
POLICY
2007
Springer
15 years 8 months ago
Towards Privacy-Aware Handling of Authorizations
Privacy issues have hindered centralised authentication approaches from being adopted by a wide range of users. This also applies to authorizations which suffer from privacy probl...
Wolfgang Dobmeier, Günther Pernul
101
Voted
WOWMOM
2006
ACM
119views Multimedia» more  WOWMOM 2006»
15 years 8 months ago
Credentials and Beliefs in Remote Trusted Platforms Attestation
— Remote attestation in trusted computing is about the ability of a local platform to authenticate the hardware and the software stack running on a remote trusted platform. We sa...
Andrea Bottoni, Gianluca Dini, Evangelos Kranakis
IMA
1997
Springer
211views Cryptology» more  IMA 1997»
15 years 6 months ago
Key Agreement Protocols and Their Security Analysis
This paper proposes new protocols for two goals: authenticated key agreement and authenticated key agreement with key con rmation in the asymmetric public-key setting. A formalm...
Simon Blake-Wilson, Don Johnson, Alfred Menezes
CHI
2008
ACM
16 years 3 months ago
The associative pda 2.0
In this paper I describe the Associative PDA 2.0, a mobile system for Personal Information Management (PIM), based on an associative information network. In addition to associate ...
Eileen Falke
132
Voted
NBIS
2009
Springer
15 years 9 months ago
A Survey of Security Middleware for Pervasive and Ubiquitous Systems
- Recently, pervasive and ubiquitous computing evolved tremendously and has become an integral part of many fields. This is widely attributed to their efficiency in integrating wit...
Jameela Al-Jaroodi, Alyaziyah Al-Dhaheri, Fatmah A...