Sciweavers

506 search results - page 75 / 102
» The Platform for Privacy Preferences
Sort
View
MATA
2004
Springer
113views Communications» more  MATA 2004»
14 years 2 months ago
PEARL: A PErformance evaluAtor of cRyptographic aLgorithms for Mobile Devices
Abstract. Limited computational power imposes new challenges during the implementation of security and privacy solutions for mobile devices. The choice for the most appropriate cry...
José Bringel Filho, Windson Viana, Rossana ...
NORDSEC
2009
Springer
14 years 1 months ago
ContikiSec: A Secure Network Layer for Wireless Sensor Networks under the Contiki Operating System
In this paper we introduce ContikiSec, a secure network layer for wireless sensor networks, designed for the Contiki Operating System. ContikiSec has a configurable design, providi...
Lander Casado, Philippas Tsigas
HICSS
2007
IEEE
171views Biometrics» more  HICSS 2007»
14 years 21 days ago
Unified Architecture for Large-Scale Attested Metering
We introduce a secure architecture called an attested meter for advanced metering that supports large-scale deployments, flexible configurations, and enhanced protection for consu...
Michael LeMay, George Gross, Carl A. Gunter, Sanja...
ECSCW
2001
13 years 10 months ago
Community support and identity management
Computer based community support systems can provide powerful support in direct exchange of information and in finding people for information exchange Such applications usually mak...
Michael Koch, Wolfgang Wörndl
ICICS
2009
Springer
13 years 6 months ago
Trusted Isolation Environment: An Attestation Architecture with Usage Control Model
The Trusted Computing Group (TCG) proposed remote attestation as a solution for establishing trust among distributed applications. However, current TCG attestation architecture req...
Anbang Ruan, Qingni Shen, Liang Gu, Li Wang, Lei S...