Sciweavers

3299 search results - page 4 / 660
» Privacy and Trusted Computing
Sort
View
TRUST
2010
Springer
14 years 16 days ago
Software on the Witness Stand: What Should It Take for Us to Trust It?
Sergey Bratus, Ashlyn Lembree, Anna Shubina
TRUST
2010
Springer
14 years 1 months ago
Lagrangian E-Voting: Verifiability on Demand and Strong Privacy
Lukasz Krzywiecki, Miroslaw Kutylowski
ISPEC
2007
Springer
14 years 2 months ago
Privacy-Preserving Credentials Upon Trusted Computing Augmented Servers
Credentials are an indispensable means for service access control in electronic commerce. However, regular credentials such as X.509 certificates and SPKI/SDSI certificates do no...
Yanjiang Yang, Robert H. Deng, Feng Bao
TRUST
2010
Springer
13 years 7 months ago
Escrowed Data and the Digital Envelope
King Ables, Mark D. Ryan
DEXAW
2002
IEEE
84views Database» more  DEXAW 2002»
14 years 1 months ago
Privacy of Trust in Similarity Estimation through Secure Computations
Javier Carbo Rubiera, José M. Molina L&oacu...