Sciweavers

300 search results - page 46 / 60
» Lightweight secure PUFs
Sort
View
SNPD
2004
13 years 10 months ago
Payment-Based Email
Spam is a major problem facing email today, and current solutions are ineffective. This paper presents our progress towards defining and implementing a payment-based email deliver...
David A. Turner, Ni Deng
ICICS
2009
Springer
13 years 6 months ago
Trusted Isolation Environment: An Attestation Architecture with Usage Control Model
The Trusted Computing Group (TCG) proposed remote attestation as a solution for establishing trust among distributed applications. However, current TCG attestation architecture req...
Anbang Ruan, Qingni Shen, Liang Gu, Li Wang, Lei S...
CCR
2010
97views more  CCR 2010»
13 years 6 months ago
On building special-purpose social networks for emergency communication
In this paper we propose a system that will allow people to communicate their status with friends and family when they find themselves caught up in a large disaster (e.g., sending...
Mark Allman
SBMF
2010
Springer
132views Formal Methods» more  SBMF 2010»
13 years 3 months ago
Midlet Navigation Graphs in JML
Abstract. In the context of the EU project Mobius on Proof Carrying Code for Java programs (midlets) on mobile devices, we present a way to express midlet navigation graphs in JML....
Wojciech Mostowski, Erik Poll
EGOV
2011
Springer
12 years 9 months ago
Pseudonymization Service for X-Road eGovernment Data Exchange Layer
Abstract. Pseudonymization is sometimes used as a light-weight alternative to fully cryptographic solutions, when information from different data sources needs to be linked in a p...
Jan Willemson