Sciweavers

506 search results - page 47 / 102
» The Platform for Privacy Preferences
Sort
View
CCS
2009
ACM
14 years 3 months ago
Anonymous credentials on a standard java card
Secure identity tokens such as Electronic Identity (eID) cards are emerging everywhere. At the same time usercentric identity management gains acceptance. Anonymous credential sch...
Patrik Bichsel, Jan Camenisch, Thomas Groß, ...
TRUST
2010
Springer
13 years 7 months ago
Key Attestation from Trusted Execution Environments
Abstract. Credential platforms implemented on top of Trusted Execution Environments3 (TrEEs) allow users to store and use their credentials, e.g., cryptographic keys or user passwo...
Kari Kostiainen, Alexandra Dmitrienko, Jan-Erik Ek...
MM
2006
ACM
122views Multimedia» more  MM 2006»
14 years 2 months ago
Human computing for interactive digital media
Widespread adoption of interactive, peer-to-peer digital media will require a solution to the Privacy, Sharing, and Interest (PSI) problem: how can we know what the user wants to ...
Alex Pentland, Jonathan Gips, Wen Dong, Will Stolt...
ATAL
2001
Springer
14 years 1 months ago
Evolving Real-Time Local Agent Control for Large-Scale Multi-agent Systems
Abstract. Control for agents situated in multi-agent systems is a complex problem. This is particularly true in hard, open, dynamic environments where resource, privacy, bandwidth,...
Thomas Wagner, Victor R. Lesser
PERCOM
2007
ACM
14 years 8 months ago
An Experimental Comparison of Event Driven and Multi-Threaded Sensor Node Operating Systems
Two different operating system types are currently considered for sensor networks: event driven and multithreaded. This paper compares the two well-known operating systems TinyOS ...
Cormac Duffy, Utz Roedig, John Herbert, Cormac J. ...