Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

CyberTrust

Known as: Baltimore Cybertrust, UniCERT 
CyberTrust was a security services company formed in Virginia in November 2004 from the merger of TruSecure and Betrusted. Cybertrust acquired a… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2011
Highly Cited
2011
This paper presents MobiMix, a road network based mix-zone framework to protect location privacy of mobile users traveling on… Expand
  • figure 1
  • table II
  • figure 2
  • figure 3
  • figure 4
Highly Cited
2011
Highly Cited
2011
We present Purlieus, a MapReduce resource allocation system aimed at enhancing the performance of MapReduce jobs in the cloud… Expand
  • figure 1
  • figure 3
  • figure 4
  • table 1
  • figure 6
Highly Cited
2011
Highly Cited
2011
Multi-core technologies are widely used in embedded systems and the resource allocation is vita to guarantee Quality of Service… Expand
  • table 1
  • figure 1
  • figure 2
  • figure 3
  • figure 4
2010
2010
With Cloud Computing gaining tremendous importance in the recent past, understanding low-level implications of the cloud… Expand
  • figure 1
  • table I
  • figure 2
  • figure 3
  • figure 4
Highly Cited
2010
Highly Cited
2010
A widely used defense practice against malicious traffic on the Internet is through blacklists: lists of prolific attack sources… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Highly Cited
2010
Highly Cited
2010
Physical computational devices leak side-channel information that may, and often does, reveal secret internal states. We present… Expand
  • figure 1
  • figure 2
Highly Cited
2009
Highly Cited
2009
Physical attacks on cryptographic implementations and devices have become crucial. In this context a recent line of research on a… Expand
  • figure 1
Highly Cited
2008
Highly Cited
2008
In peer-to-peer (P2P) networks, reputation aggregation and ranking are the most time-consuming and space-demanding operations… Expand
  • table 1
  • figure 1
  • figure 2
  • table 2
  • figure 3
2007
2007
In this work we identify vulnerabilities of on- demand multicast routing protocols for multi-hop wireless networks and discuss… Expand
  • figure 4
  • figure 5
  • figure 6
  • figure 7
  • figure 8
2006
2006
The camera response function (CRF) models the important characteristics of cameras and digital images. Recent work in [1… Expand
  • figure 1
  • figure 2
  • table 1
  • figure 3
  • table 2