Sciweavers

947 search results - page 166 / 190
» HMM-Based Trust Model
Sort
View
INFOCOM
2006
IEEE
14 years 4 months ago
Establishing Pair-Wise Keys in Heterogeneous Sensor Networks
— Many applications that make use of sensor networks require secure communication. Because asymmetric-key solutions are difficult to implement in such a resource-constrained env...
Patrick Traynor, Heesook Choi, Guohong Cao, Sencun...
MICRO
2006
IEEE
114views Hardware» more  MICRO 2006»
14 years 4 months ago
Authentication Control Point and Its Implications For Secure Processor Design
Secure processor architecture enables tamper-proof protection on software that addresses many difficult security problems such as reverse-engineering prevention, trusted computing...
Weidong Shi, Hsien-Hsin S. Lee
ECRTS
2005
IEEE
14 years 4 months ago
Fast Component Interaction for Real-Time Systems
Open real-time systems provide for co-hosting hard-, soft- and non-real-time applications. Microkernel-based designs in addition allow for these applications to be mutually protec...
Udo Steinberg, Jean Wolter, Hermann Härtig
HICSS
2005
IEEE
129views Biometrics» more  HICSS 2005»
14 years 4 months ago
An Integrated Approach to Online Partnership Building
Research in information sciences in recent years has dealt with how to support collaborative work across time, space and organizational boundaries. However, this research neglecte...
Tobias Keim, Tim Weitzel
ICDE
2005
IEEE
124views Database» more  ICDE 2005»
14 years 4 months ago
SemCrypt - Ensuring Privacy of Electronic Documents Through Semantic-Based Encrypted Query Processing
The trend towards outsourcing increases the number of documents stored at external service providers. This storage model, however, raises privacy and security concerns because the...
Michael Schrefl, Katharina Grün, Jürgen ...