-
1
-
-
51349140660
-
Towards Securing Disruption-Tolerant Networking
-
Technical Report NRC-TR-2007-007, Nokia Research Center, March
-
N. Asokan, K. Kostianinen, P. Ginzboorg, J. Ott, and C. Luo. Towards Securing Disruption-Tolerant Networking. Technical Report NRC-TR-2007-007, Nokia Research Center, March 2007.
-
(2007)
-
-
Asokan, N.1
Kostianinen, K.2
Ginzboorg, P.3
Ott, J.4
Luo, C.5
-
2
-
-
84958955276
-
The Untrusted Computer Problem and Camera-Based Authentication
-
August
-
D. Clarke, B. Gassend, T. Kotwal, M. Burnside, M. van Dijk, S. Devadas, and R. Rivest. The Untrusted Computer Problem and Camera-Based Authentication. In Proc. of Int'l Conference on Pervasive Computing (Pervasive 2002), pages 114-124, August 2002.
-
(2002)
Proc. of Int'l Conference on Pervasive Computing (Pervasive 2002)
, pp. 114-124
-
-
Clarke, D.1
Gassend, B.2
Kotwal, T.3
Burnside, M.4
van Dijk, M.5
Devadas, S.6
Rivest, R.7
-
3
-
-
70249108093
-
Delay-Tolerant Networking Security Overview-draft-irtf-dtnrg-sec-overview-03. Internet Draft
-
July
-
S. Farrell, S. Symington, H. Weiss, and P. Lovell. Delay-Tolerant Networking Security Overview-draft-irtf-dtnrg-sec-overview-03. Internet Draft, July 2007.
-
(2007)
-
-
Farrell, S.1
Symington, S.2
Weiss, H.3
Lovell, P.4
-
4
-
-
46449133585
-
Towards Trustworthy Kiosk Computing
-
February
-
S. Garriss, R. Cáceres, S. Berger, R. Sailer, L. van Doorn, and Z. Zhang. Towards Trustworthy Kiosk Computing. In Proc. of 8th IEEE Workshop on Mobile Computing Systems and Applications (HotMobile'07), pages 41-45, February 2007.
-
(2007)
Proc. of 8th IEEE Workshop on Mobile Computing Systems and Applications (HotMobile'07)
, pp. 41-45
-
-
Garriss, S.1
Cáceres, R.2
Berger, S.3
Sailer, R.4
van Doorn, L.5
Zhang, Z.6
-
5
-
-
67650554176
-
Design and Implementation of the KioskNet System
-
December
-
S. Guo, M. H. Falaki, E. A. Oliver, S. Ur Rahman, A. Seth, M. A. Zaharia, U. Ismail, and S. Keshav. Design and Implementation of the KioskNet System. In Proc. of IEEE/ACM International Conference on Information and Communication Technologies and Development (ICTD2007), December 2007.
-
(2007)
Proc. of IEEE/ACM International Conference on Information and Communication Technologies and Development (ICTD2007)
-
-
Guo, S.1
Falaki, M.H.2
Oliver, E.A.3
Rahman, S.U.4
Seth, A.5
Zaharia, M.A.6
Ismail, U.7
Keshav, S.8
-
6
-
-
84882980040
-
-
P. Gutmann. Plug-and-Play PKI: A PKI your Mother can Use. In Proc. of 12th USENIX Security Symposium, pages 45-58, August 2003.
-
P. Gutmann. Plug-and-Play PKI: A PKI your Mother can Use. In Proc. of 12th USENIX Security Symposium, pages 45-58, August 2003.
-
-
-
-
8
-
-
21644455714
-
Securing a Remote Terminal Application with a Mobile Trusted Device
-
December
-
A. Oprea, D. Balfanz, G. Durfee, and D. K. Smetters. Securing a Remote Terminal Application with a Mobile Trusted Device. In Proc. of 20th Annual Computer Security Applications Conference (ACSAC 2004), pages 438-447, December 2004.
-
(2004)
Proc. of 20th Annual Computer Security Applications Conference (ACSAC 2004)
, pp. 438-447
-
-
Oprea, A.1
Balfanz, D.2
Durfee, G.3
Smetters, D.K.4
-
10
-
-
33751030085
-
Low-cost Communication for Rural Internet Kiosks Using Mechanical Backhaul
-
September
-
A. Seth, D. Kroeker, M. Zaharia, S. Guo, and S. Keshav. Low-cost Communication for Rural Internet Kiosks Using Mechanical Backhaul. In Proc. of 12th Int'l Conference on Mobile Computing and Networking (MOBICOM 2006), pages 334-345, September 2006.
-
(2006)
Proc. of 12th Int'l Conference on Mobile Computing and Networking (MOBICOM 2006)
, pp. 334-345
-
-
Seth, A.1
Kroeker, D.2
Zaharia, M.3
Guo, S.4
Keshav, S.5
-
12
-
-
35348905103
-
Rapid Trust Establishment for Pervasive Personal Computing
-
October-December
-
A. Surie, A. Perrig, M. Satyanarayanan, and D. J. Farber. Rapid Trust Establishment for Pervasive Personal Computing. IEEE Pervasive Computing, 6(4):24-30, October-December 2007.
-
(2007)
IEEE Pervasive Computing
, vol.6
, Issue.4
, pp. 24-30
-
-
Surie, A.1
Perrig, A.2
Satyanarayanan, M.3
Farber, D.J.4
-
13
-
-
70249083727
-
-
Accessed May 2008
-
Telecentre.org. http://www.telecentre.org. Accessed May 2008.
-
Telecentre.org
-
-
-
14
-
-
70249112565
-
-
Tetherless Computing Group, Accessed May 2008
-
Tetherless Computing Group. http://blizzard.cs.uwaterloo.ca/tetherless. Accessed May 2008.
-
-
-
-
15
-
-
70249149632
-
-
Trusted Computing Group, Accessed May 2008
-
Trusted Computing Group. https://www.trustedcomputinggroup.org. Accessed May 2008.
-
-
-
-
16
-
-
70249099514
-
-
S. Ur Rahman, U. Hengartner, U. Ismail, and S. Keshav. Securing KioskNet: A Systems Approach. Technical Report CS-2007-43, David R. Cheriton School of Computer Science, University of Waterloo, November 2007.
-
S. Ur Rahman, U. Hengartner, U. Ismail, and S. Keshav. Securing KioskNet: A Systems Approach. Technical Report CS-2007-43, David R. Cheriton School of Computer Science, University of Waterloo, November 2007.
-
-
-
|