Login / Signup
Trust (and mistrust) in secure applications.
John Viega
Tadayoshi Kohno
Bruce Potter
Published in:
Commun. ACM (2001)
Keyphrases
</>
trusted computing
security services
trust model
security requirements
trust relationships
trust evaluation
public key infrastructure
lightweight
security issues
identity management
covert channel
neural network
security mechanisms
security management