Sciweavers

344 search results - page 57 / 69
» trust 2009
Sort
View
DEXAW
2009
IEEE
129views Database» more  DEXAW 2009»
14 years 14 days ago
Towards a Generic Process for Security Pattern Integration
Abstract--Interdependencies between different security patterns can influence the properties of a particular pattern when applied in conjunction with other patterns. The resulting ...
Andreas Fuchs, Sigrid Gürgens, Carsten Rudolp...
DSN
2009
IEEE
14 years 14 days ago
HC-BGP: A light-weight and flexible scheme for securing prefix ownership
The Border Gateway Protocol (BGP) is a fundamental building block of the Internet infrastructure. However, due to the implicit trust assumption among networks, Internet routing re...
Ying Zhang, Zheng Zhang, Zhuoqing Morley Mao, Y. C...
GLOBECOM
2009
IEEE
14 years 14 days ago
Restarting Particle Filters: An Approach to Improve the Performance of Dynamic Indoor Localization
Particle filters have been found to be effective in tracking mobile targets in indoor environments. One frequently encountered problem in these settings occurs when the target'...
Begumhan Turgut, Richard P. Martin
CISC
2009
Springer
148views Cryptology» more  CISC 2009»
13 years 6 months ago
A DAA Scheme Requiring Less TPM Resources
Abstract. Direct anonymous attestation (DAA) is a special digital signature primitive, which provides a balance between signer authentication and privacy. One of the most interesti...
Liqun Chen
DRR
2009
13 years 6 months ago
Using synthetic data safely in classification
When is it safe to use synthetic data in supervised classification? Trainable classifier technologies require large representative training sets consisting of samples labeled with...
Jean Nonnemaker, Henry Baird