Sciweavers

2022 search results - page 186 / 405
» Trust in Multi-Agent Systems
Sort
View
TRUST
2009
Springer
14 years 3 months ago
ACPI: Design Principles and Concerns
Abstract. ACPI (Advanced Configuration Power Interface) allows operating systems to efficiently configure the hardware platform they are running on and deal with power management...
Loïc Duflot, Olivier Levillain, Benjamin Mori...
ESORICS
2003
Springer
14 years 2 months ago
Hardware Encapsulation of Security Services
Hardware security modules can be used to encapsulate simple security services that bind security functions such as decryption with authorisation and authentication. Such hardware ...
Adrian Baldwin, Simon Shiu
USENIX
2004
13 years 10 months ago
Trusted Path Execution for the Linux 2.6 Kernel as a Linux Security Module
The prevention of damage caused to a system via malicious executables is a significant issue in the current state of security on Linux operating systems. Several approaches are av...
Niki A. Rahimi
EUROCRYPT
2007
Springer
14 years 3 months ago
Divisible E-Cash Systems Can Be Truly Anonymous
This paper presents an off-line divisible e-cash scheme where a user can withdraw a divisible coin of monetary value 2L that he can parceled and spend anonymously and unlinkably. ...
Sébastien Canard, Aline Gouget
EDBTW
2004
Springer
14 years 2 months ago
Query Answering in Peer-to-Peer Data Exchange Systems
The problem of answering queries posed to a peer who is a member of a peer-to-peerdataexchangesystemisstudied.Theanswershavetobeconsistentwrt to both the local semantic constraints...
Leopoldo E. Bertossi, Loreto Bravo