Sciweavers

5665 search results - page 218 / 1133
» Introduction to Computer Security
Sort
View
ENTCS
2008
87views more  ENTCS 2008»
13 years 10 months ago
Remote Attestation on Legacy Operating Systems With Trusted Platform Modules
A lot of progress has been made to secure network communication, e.g., through the use of cryptographic algorithms. However, this offers only a partial solution as long as the com...
Dries Schellekens, Brecht Wyseur, Bart Preneel
CODASPY
2012
12 years 6 months ago
Comparison-based encryption for fine-grained access control in clouds
Access control is one of the most important security mechanisms in cloud computing. However, there has been little work that explores various comparison-based constraints for regu...
Yan Zhu, Hongxin Hu, Gail-Joon Ahn, Mengyang Yu, H...
PET
2012
Springer
12 years 23 days ago
Practical Privacy Preserving Cloud Resource-Payment for Constrained Clients
The continuing advancements in microprocessor technologies are putting more and more computing power into small devices. Today smartphones are especially popular. Nevertheless, for...
Martin Pirker, Daniel Slamanig, Johannes Winter
ICDS
2008
IEEE
14 years 4 months ago
Security Arguments for a Class of ID-Based Signatures
Zhengwei Guo, Xinzheng He, Baocheng Xun