Results 251 to 260 of about 13,284 (309)
Privacy-Preserving Computation with Trusted Computing via Scramble-then-Compute
Hung Dang +3 more
openalex
Some of the next articles are maybe not open access.
Related searches:
Related searches:
netWorker, 2006
Will the open, unrestricted PC soon become a thing of the past?
openaire +1 more source
Will the open, unrestricted PC soon become a thing of the past?
openaire +1 more source
2009
Computer attacks of all sorts are commonplace in today’s interconnected, globalized society. A computer worm, written and released in one part of the world, can now traverse cyberspace in mere minutes creating havoc and untold financial hardship and loss.
openaire +2 more sources
Computer attacks of all sorts are commonplace in today’s interconnected, globalized society. A computer worm, written and released in one part of the world, can now traverse cyberspace in mere minutes creating havoc and untold financial hardship and loss.
openaire +2 more sources
Trusting Computers Through Trusting Humans
International Journal of Technology and Human Interaction, 2007This article considers the question of how we may trust automatically generated program code. The code walkthroughs and inspections of software engineering mimic the ways that mathematicians go about assuring themselves that a mathematical proof is true.
Alison Adam, Paul Spedding
openaire +1 more source
Protected Computing vs. Trusted Computing
2006 1st International Conference on Communication Systems Software & Middleware, 2006The Trusted Computing initiative represents an important effort towards more secure and dependable computers and therefore towards the security of all computer-supported infrastructures and processes. However, the Trusted Computing paradigm entails some risks and drawbacks that are by no means negligible.
A. Mana, A. Munoz
openaire +1 more source

