Sciweavers

881 search results - page 32 / 177
» Secure Personal Data Servers: a Vision Paper
Sort
View
SIGCOMM
2012
ACM
11 years 10 months ago
Signposts: end-to-end networking in a world of middleboxes
This demo presents Signposts, a system to provide users with a secure, simple mechanism to establish and maintain communication channels between their personal cloud of named devi...
Amir Chaudhry, Anil Madhavapeddy, Charalampos Rots...
ACSAC
2006
IEEE
14 years 1 months ago
Delegate: A Proxy Based Architecture for Secure Website Access from an Untrusted Machine
Performing sensitive online transactions using computers found in cybercaf´es and public libraries is risky. The untrusted nature of these machines creates a target rich environm...
Ravi Chandra Jammalamadaka, Timothy W. van der Hor...
HUC
2010
Springer
13 years 8 months ago
Groupthink: usability of secure group association for wireless devices
A fairly common modern setting entails users, each in possession of a personal wireless device, wanting to communicate securely, via their devices. If these users (and their devic...
Rishab Nithyanand, Nitesh Saxena, Gene Tsudik, Ers...
ASPLOS
2006
ACM
14 years 1 months ago
Architectural support for software-based protection
Control-Flow Integrity (CFI) is a property that guarantees program control flow cannot be subverted by a malicious adversary, even if the adversary has complete control of data m...
Mihai Budiu, Úlfar Erlingsson, Martí...
AVSS
2005
IEEE
14 years 1 months ago
Stereo person tracking with short and long term plan-view appearance models of shape and color
Copyright 2005 IEEE. Published in the 2005 International Conference on Advanced Video and Signal-based Surveillance (AVSS-2005), September 15-16, 2005, Como, Italy. Personal use o...
Michael Harville