Sciweavers

94 search results - page 8 / 19
» Principles of remote attestation
Sort
View
COMSWARE
2006
IEEE
14 years 1 months ago
Remote storage for mobile devices
— The ability to access remote file storage from mobile devices enables a number of new use cases for storing and sharing data. We describe the design and implementation of a Rem...
Jarkko Tolvanen, Tapio Suihko, Jaakko Lipasti, N. ...
CHI
2008
ACM
14 years 7 months ago
Asynchronous remote medical consultation for Ghana
Computer-mediated communication systems can be used to bridge the gap between doctors in underserved regions with local shortages of medical expertise and medical specialists worl...
Rowena Luk, Melissa Ho, Paul M. Aoki
ICIAP
2001
Springer
14 years 7 months ago
Wavelet-Based Texture Segmentation of Remotely Sensed Images
In this article a texturefeature extraction scheme based on M-band waveletpacketframes is investigated. Thefeatures so extracted are usedfor segmentation of satellite images which...
Mausumi Acharyya, Malay K. Kundu
NDSS
1998
IEEE
13 years 11 months ago
The Secure Remote Password Protocol
This paper presents a new password authentication and key-exchange protocol suitable for authenticating users and exchanging keys over an untrusted network. The new protocol resis...
Thomas D. Wu
SP
2009
IEEE
155views Security Privacy» more  SP 2009»
14 years 2 months ago
A Logic of Secure Systems and its Application to Trusted Computing
We present a logic for reasoning about properties of secure systems. The logic is built around a concurrent programming language with constructs for modeling machines with shared ...
Anupam Datta, Jason Franklin, Deepak Garg, Dilsun ...