Sciweavers

344 search results - page 58 / 69
» trust 2009
Sort
View
FLAIRS
2009
13 years 6 months ago
Modeling Belief Change on Epistemic States
Belief revision always results in trusting new evidence, so it may admit an unreliable one and discard a more confident one. We therefore use belief change instead of belief revis...
Jianbing Ma, Weiru Liu
IADIS
2009
13 years 6 months ago
Trash article detection using categorization techniques
We explore techniques for detecting news articles containing invalid information, using the help of text categorization technology. The information that exists on the World Wide W...
Christos Bouras, Vassilis Tsogkas, Vassilis Poulop...
ICB
2009
Springer
156views Biometrics» more  ICB 2009»
13 years 6 months ago
Efficient Biometric Verification in Encrypted Domain
Biometric authentication over public networks leads to a variety of privacy issues that needs to be addressed before it can become popular. The primary concerns are that the biomet...
Maneesh Upmanyu, Anoop M. Namboodiri, K. Srinathan...
ICFEM
2009
Springer
13 years 6 months ago
Implementing a Direct Method for Certificate Translation
Abstract. Certificate translation is a method that transforms certificates of source programs into certificates of their compilation. It provides strong guarantees on low-level cod...
Gilles Barthe, Benjamin Grégoire, Sylvain H...
IFIP
2009
Springer
13 years 6 months ago
Attack, Solution and Verification for Shared Authorisation Data in TCG TPM
The Trusted Platform Module (TPM) is a hardware chip designed to enable computers achieve greater security. Proof of possession of authorisation values known as authdata is require...
Liqun Chen, Mark Ryan