Sciweavers

1229 search results - page 156 / 246
» Trusted Computing
Sort
View
BMVC
2000
13 years 10 months ago
Quantifying Ambiguities in Inferring Vector-Based 3D Models
This paper presents a framework for directly addressing issues arising from self-occlusions and ambiguities due to the lack of depth information in vector-based representations. V...
Eng-Jon Ong, Shaogang Gong
PERCOM
2010
ACM
13 years 7 months ago
Privacy-preserving admission to mobile peer-to-peer groups
Mobile peer-to-peer groups, which do not require any pre-deployed infrastructure or trusted centralized authority are valuable for a variety of collaborative applications. This wor...
Mark Manulis
ACISP
2007
Springer
14 years 3 months ago
A Practical System for Globally Revoking the Unlinkable Pseudonyms of Unknown Users
We propose the first single sign-on system in which a user can access services using unlinkable digital pseudonyms that can all be revoked in case she abuses any one service. Our ...
Stefan Brands, Liesje Demuynck, Bart De Decker
IEEEARES
2006
IEEE
14 years 3 months ago
Towards an Integrated Conceptual Model of Security and Dependability
It is now commonly accepted that security and dependability largely represent two different aspects of an overall meta-concept that reflects the trust that we put in a computer s...
Erland Jonsson
HICSS
2003
IEEE
177views Biometrics» more  HICSS 2003»
14 years 2 months ago
Is the Applicability of Web-Based Surveys for Academic Research Limited to the Field of Information Technology?
Currently, the Internet provides researchers with the opportunity to conduct online surveys in a more efficient and effective way than was previously allowed by traditional means....
Narcyz Roztocki, Nawal Ait Lahri