Sciweavers

391 search results - page 16 / 79
» Attack-Resistance of Computational Trust Models
Sort
View
ESORICS
2006
Springer
13 years 11 months ago
TrustedPals: Secure Multiparty Computation Implemented with Smart Cards
We study the problem of Secure Multi-party Computation (SMC) in a model where individual processes contain a tamper-proof security module, and introduce the TrustedPals framework, ...
Milan Fort, Felix C. Freiling, Lucia Draque Penso,...
DBISP2P
2003
Springer
76views Database» more  DBISP2P 2003»
14 years 1 months ago
Trust-Aware Delivery of Composite Goods
Abstract. The vast majority of the interactions in typical online communities nowadays is between complete strangers. In such settings reputation reporting and trust management mod...
Magdalena Punceva, Karl Aberer
IPMI
2005
Springer
14 years 8 months ago
Computational Elastography from Standard Ultrasound Image Sequences by Global Trust Region Optimization
Abstract. A new approach is proposed to estimate the spatial distribution of shear modulus of tissues in-vivo. An image sequence is acquired using a standard medical ultrasound sca...
Jan Kybic, Daniel Smutek
ATAL
2005
Springer
14 years 1 months ago
Coping with inaccurate reputation sources: experimental analysis of a probabilistic trust model
This research aims to develop a model of trust and reputation that will ensure good interactions amongst software agents in large scale open systems. The following are key drivers...
W. T. Luke Teacy, Jigar Patel, Nicholas R. Jenning...
ATAL
2008
Springer
13 years 10 months ago
A statistical relational model for trust learning
We address the learning of trust based on past observations and context information. We argue that from the truster's point of view trust is best expressed as one of several ...
Achim Rettinger, Matthias Nickles, Volker Tresp