Sciweavers

1120 search results - page 174 / 224
» Trust in Electronic Environments
Sort
View
EUROSYS
2010
ACM
14 years 3 months ago
NOVA: a microhypervisor-based secure virtualization architecture
The availability of virtualization features in modern CPUs has reinforced the trend of consolidating multiple guest operating systems on top of a hypervisor in order to improve pl...
Udo Steinberg, Bernhard Kauer
CSFW
1999
IEEE
14 years 2 months ago
Secure Composition of Insecure Components
Software systems are becoming heterogeneous: instead of a small number of large programs from well-established sources, a user's desktop may now consist of many smaller compo...
Peter Sewell, Jan Vitek
ECRIME
2007
14 years 2 months ago
Behavioral response to phishing risk
Tools that aim to combat phishing attacks must take into account how and why people fall for them in order to be effective. This study reports a pilot survey of 232 computer users...
Julie S. Downs, Mandy B. Holbrook, Lorrie Faith Cr...
GLOBECOM
2009
IEEE
14 years 1 months ago
Restarting Particle Filters: An Approach to Improve the Performance of Dynamic Indoor Localization
Particle filters have been found to be effective in tracking mobile targets in indoor environments. One frequently encountered problem in these settings occurs when the target'...
Begumhan Turgut, Richard P. Martin
CHES
2006
Springer
179views Cryptology» more  CHES 2006»
14 years 1 months ago
Offline Hardware/Software Authentication for Reconfigurable Platforms
Abstract. Many Field-Programmable Gate Array (FPGA) based systems utilize third-party intellectual property (IP) in their development. When they are deployed in non-networked envir...
Eric Simpson, Patrick Schaumont