Sciweavers

197 search results - page 33 / 40
» A Survey of Trust in Internet Applications
Sort
View
NDSS
2008
IEEE
14 years 1 months ago
A New Privacy-Enhanced Matchmaking Protocol
Although several wide-spread internet applications (e.g., job-referral services, dating services) can benefit from online matchmaking, protocols defined over the past two decade...
Ji Sun Shin, Virgil D. Gligor
WETICE
2008
IEEE
14 years 1 months ago
Integrating Overlay and Social Networks for Seamless P2P Networking
In this paper we introduce Social VPNs, a novel system architecture which leverages existing social networking infrastructures to enable ad-hoc VPNs which are self-configuring, s...
Renato J. O. Figueiredo, P. Oscar Boykin, Pierre S...
WINE
2005
Springer
123views Economy» more  WINE 2005»
14 years 29 days ago
An Adaptive Group-Based Reputation System in Peer-to-Peer Networks
Abstract. As more and more P2P applications being popular in Internet, one of important problem to be solved is inspiring users to cooperate each other actively and honestly, the r...
Liang Sun, Li Jiao, Yufeng Wang, Shiduan Cheng, We...
DISCEX
2003
IEEE
14 years 24 days ago
The STRONGMAN Architecture
The design principle of restricting local autonomy only where necessary for global robustness has led to a scalable Internet. Unfortunately, this scalability and capacity for dist...
Angelos D. Keromytis, Sotiris Ioannidis, Michael B...
ICNP
2003
IEEE
14 years 23 days ago
On the Utility of Distributed Cryptography in P2P and MANETs: The Case of Membership Control
Peer-to-peer systems enable efficient resource aggregation and are inherently scalable since they do not depend on any centralized authority. However, lack of a centralized autho...
Maithili Narasimha, Gene Tsudik, Jeong Hyun Yi