Sciweavers

1856 search results - page 308 / 372
» Phoning it in
Sort
View
TRUST
2010
Springer
13 years 7 months ago
Key Attestation from Trusted Execution Environments
Abstract. Credential platforms implemented on top of Trusted Execution Environments3 (TrEEs) allow users to store and use their credentials, e.g., cryptographic keys or user passwo...
Kari Kostiainen, Alexandra Dmitrienko, Jan-Erik Ek...
TVCG
2010
194views more  TVCG 2010»
13 years 7 months ago
Declarative Language Design for Interactive Visualization
Abstract—We investigate the design of declarative, domain-specific languages for constructing interactive visualizations. By separating specification from execution, declarativ...
Jeffrey Heer, Michael Bostock
UIC
2010
Springer
13 years 7 months ago
Extracting Social and Community Intelligence from Digital Footprints: An Emerging Research Area
As a result of the recent explosion of sensor-equipped mobile phone market, the phenomenal growth of Internet and social network users, and the large deployment of sensor network i...
Daqing Zhang, Bin Guo, Bin Li, Zhiwen Yu
CORR
2010
Springer
59views Education» more  CORR 2010»
13 years 7 months ago
Refinement and Verification of Real-Time Systems
This paper discusses highly general mechanisms for specifying the refinement of a real-time system as a collection of lower level parallel components that preserve the timing and ...
Paul Z. Kolano, Carlo A. Furia, Richard A. Kemmere...
ACSAC
2010
IEEE
13 years 7 months ago
Keeping data secret under full compromise using porter devices
We address the problem of confidentiality in scenarios where the attacker is not only able to observe the communication between principals, but can also fully compromise the commu...
Christina Pöpper, David A. Basin, Srdjan Capk...