Sciweavers

1229 search results - page 191 / 246
» Trusted Computing
Sort
View
ICDCS
2005
IEEE
14 years 1 months ago
Scalable, Server-Passive, User-Anonymous Timed Release Cryptography
We consider the problem of sending messages into the future, commonly known as timed release cryptography. Existing schemes for this task either solve the relative time problem wi...
Aldar C.-F. Chan, Ian F. Blake
IPPS
2005
IEEE
14 years 1 months ago
ExchangeGuard: A Distributed Protocol for Electronic Fair-Exchange
1 Electronic fair-exchange protocols have received significant attention from the research community in the recent past. In loose terms, the fair exchange problem is defined as at...
Mudhakar Srivatsa, Li Xiong, Ling Liu
GROUP
2005
ACM
14 years 1 months ago
Timing in the art of integration: 'that's how the bastille got stormed'
This paper uses a long term ethnographic study of the design and implementation of an electronic patient records (EPR) system in a UK hospital Trust to consider issues arising in ...
David Martin, Mark Rouncefield, Jacki O'Neill, Mar...
MHCI
2005
Springer
14 years 1 months ago
ContextContacts: re-designing SmartPhone's contact book to support mobile awareness and collaboration
Acontextuality of the mobile phone often leads to a caller’s uncertainty over a callee’s current state, which in turn often hampers mobile collaboration. We are interested in ...
Antti Oulasvirta, Mika Raento, Sauli Tiitta
SACMAT
2004
ACM
14 years 1 months ago
Implementing access control to people location information
Ubiquitous computing uses a variety of information for which access needs to be controlled. For instance, a person’s current location is a sensitive piece of information, which ...
Urs Hengartner, Peter Steenkiste