Sciweavers

334 search results - page 39 / 67
» trust 2010
Sort
View
GLOBECOM
2010
IEEE
13 years 7 months ago
A Distributed Public Key Caching Scheme in Large Wireless Networks
When asymmetric cryptography techniques are used in wireless networks, the public keys of the nodes need to be widely available and signed by a Certificate Authority (CA). However,...
Yuan Kong, Jing Deng, Stephen R. Tate
DIMVA
2010
13 years 11 months ago
Conqueror: Tamper-Proof Code Execution on Legacy Systems
We present Conqueror, a software-based attestation scheme for tamper-proof code execution on untrusted legacy systems. Beside providing load-time attestation of a piece of code, Co...
Lorenzo Martignoni, Roberto Paleari, Danilo Brusch...
MEDIAFORENSICS
2010
13 years 11 months ago
Image forensic analyses that elude the human visual system
While historically we may have been overly trusting of photographs, in recent years there has been a backlash of sorts and the authenticity of photographs is now routinely questio...
Hany Farid, Mary J. Bravo
ECR
2006
81views more  ECR 2006»
13 years 10 months ago
Reputation management and signature delegation: A distributed approach
In this paper, we present a novel protocol, called Distributed Signcryption with Verifiable Partial Signature (DiSigncryption) protocol, to allow an agent owner to securely distrib...
Omaima Bamasak, Ning Zhang
ELECTRONICMARKETS
2000
130views more  ELECTRONICMARKETS 2000»
13 years 9 months ago
Virtual Communities of Transaction: The Role of Personalization in Electronic Commerce
Bringing communities of buyers and sellers together in the arena of electronic commerce stimulates three major potentials: the building of trust, the collection and effective use ...
Petra Schubert, Mark Ginsburg