Sciweavers

582 search results - page 50 / 117
» Security and Privacy Challenges in Cloud Computing Environme...
Sort
View
PDP
2008
IEEE
14 years 3 months ago
Privacy Protection in Context Transfer Protocol
In the future 4G wireless networks will span across different administrative domains. In order to provide secure seamless handovers in such an environment the Context Transfer Pro...
Giorgos Karopoulos, Georgios Kambourakis, Stefanos...
AGENTS
2001
Springer
14 years 1 months ago
Adjustable autonomy in real-world multi-agent environments
Through adjustable autonomy (AA), an agent can dynamically vary the degree to which it acts autonomously, allowing it to exploit human abilities to improve its performance, but wi...
Paul Scerri, David V. Pynadath, Milind Tambe
ACSAC
2006
IEEE
14 years 19 days ago
CryptoPage: An Efficient Secure Architecture with Memory Encryption, Integrity and Information Leakage Protection
Several secure computing hardware architectures using memory encryption and memory integrity checkers have been proposed during the past few years to provide applications with a t...
Guillaume Duc, Ronan Keryell
SP
2006
IEEE
143views Security Privacy» more  SP 2006»
14 years 2 months ago
Cognitive Authentication Schemes Safe Against Spyware (Short Paper)
Can we secure user authentication against eavesdropping adversaries, relying on human cognitive functions alone, unassisted by any external computational device? To accomplish thi...
Daphna Weinshall
SOUPS
2009
ACM
14 years 3 months ago
Usability and security of out-of-band channels in secure device pairing protocols
Initiating and bootstrapping secure, yet low-cost, ad-hoc transactions is an important challenge that needs to be overcome if the promise of mobile and pervasive computing is to b...
Ronald Kainda, Ivan Flechais, A. W. Roscoe