Sciweavers

160 search results - page 8 / 32
» Key Attestation from Trusted Execution Environments
Sort
View
JUCS
2010
89views more  JUCS 2010»
13 years 5 months ago
Towards a Virtual Trusted Platform
: The advances and adoption of Trusted Computing and hardware assisted virtualisation technologies in standard PC platforms promise new approaches in building a robust virtualisati...
Martin Pirker, Ronald Toegl
ATAL
2009
Springer
14 years 1 months ago
Smart cheaters do prosper: defeating trust and reputation systems
Traders in electronic marketplaces may behave dishonestly, cheating other agents. A multitude of trust and reputation systems have been proposed to try to cope with the problem of...
Reid Kerr, Robin Cohen
ICRA
2007
IEEE
126views Robotics» more  ICRA 2007»
14 years 1 months ago
Semantic Knowledge-Based Execution Monitoring for Mobile Robots
Abstract— We describe a novel intelligent execution monitoring approach for mobile robots acting in indoor environments such as offices and houses. Traditionally, monitoring exe...
Abdelbaki Bouguerra, Lars Karlsson, Alessandro Saf...
ACSC
2005
IEEE
14 years 1 months ago
Dependable Dynamic Source Routing without a Trusted Third Party
Ad-hoc networks are frequently used to establish communication in improvised environments without requiring any fixed infrastructure. These networks are formed with the help of t...
Asad Amir Pirzada, Chris McDonald, Amitava Datta
JITECH
2007
136views more  JITECH 2007»
13 years 7 months ago
A computer scientist's reactions to NPfIT
This paper contains a set of personal views relating to NHS Connecting for Health’s National Programme for IT (NPfIT), and in particular its Care Records Service, written from t...
Brian Randell