Sciweavers

6861 search results - page 66 / 1373
» Security for Ubiquitous Computing
Sort
View
CAISE
2006
Springer
14 years 2 months ago
Community based Ubiquitous System Development in Multi-agent Environment
Ubiquitous system can be considered as the intelligent space, in which many kinds of component are connected by networks and also each component recognizes their connection and coo...
Youna Jung, Jungtae Lee, Minkoo Kim
GLOBECOM
2006
IEEE
14 years 4 months ago
On the Feasibility of Very Low Complexity Trust Modules Using PKPS Synergies
Abstract— For many evolving application scenarios like ubiquitous and autonomic computing systems, trustworthy computing solutions are essential. However the fact that the autono...
Mahalingam Ramkumar
ACSAC
2004
IEEE
14 years 2 months ago
Open-Source Applications of TCPA Hardware
How can Alice trust computation occurring at Bob's computer? Since it exists and is becoming ubiquitous, the current-generation TCPA/TCG hardware might enable a solution. Whe...
John Marchesini, Sean W. Smith, Omen Wild, Joshua ...
ARITH
2001
IEEE
14 years 2 months ago
Computer Arithmetic-A Processor Architect's Perspective
The Instruction Set Architecture (ISA) of a programmable processor is the native languageof the machine. It defines the set of operations and resourcesthat are optimized for that ...
Ruby B. Lee
TC
2008
13 years 10 months ago
Computationally Efficient PKI-Based Single Sign-On Protocol, PKASSO for Mobile Devices
In an attempt to expand Public Key Infrastructure (PKI) usage to a ubiquitous and mobile computing environment, we found that the deployment of the PKI on a resource-constrained de...
Ki-Woong Park, Sang Seok Lim, Kyu Ho Park