Sciweavers

3299 search results - page 90 / 660
» Privacy and Trusted Computing
Sort
View
ESORICS
2009
Springer
14 years 9 months ago
A Generic Security API for Symmetric Key Management on Cryptographic Devices
Security APIs are used to define the boundary between trusted and untrusted code. The security properties of existing APIs are not always clear. In this paper, we give a new generi...
Véronique Cortier, Graham Steel
TRUSTBUS
2005
Springer
14 years 2 months ago
Dropout-Tolerant TTP-Free Mental Poker
There is a broad literature on distributed card games over communications networks, collectively known as mental poker. Like in any distributed protocol, avoiding the need for a Tr...
Jordi Castellà-Roca, Francesc Sebé, ...
USS
2008
13 years 11 months ago
Bootstrapping Trust in a "Trusted" Platform
For the last few years, many commodity computers have come equipped with a Trusted Platform Module (TPM). Existing research shows that the TPM can be used to establish trust in th...
Bryan Parno
NORDSEC
2009
Springer
14 years 1 months ago
Security and Trust for the Norwegian E-Voting Pilot Project E-valg 2011
Early 2009, the Norwegian Ministry of Local Government and Regional Development (KRD) decided to start a procurement procedure for E-valg 2011, an e-voting pilot project for the mu...
Arne Ansper, Sven Heiberg, Helger Lipmaa, Tom Andr...
ICIP
2008
IEEE
14 years 10 months ago
Managing privacy data in pervasive camera networks
Privacy protection of visual information is increasingly important as pervasive camera networks becomes more prevalent. The proposed scheme addresses the problem of preserving and...
Sen-Ching S. Cheung, Jithendra K. Paruchuri, Thinh...