In recent years, several trust and reputation models have been proposed to enhance the security of mobile ad hoc networks. However, they either fail to capture evidence of trustwo...
The recent explosion in shared media content and sensed data produced by mobile end-users is challenging well-established principles and assumptions in data trust models. A fundam...
Vincent Lenders, Emmanouil Koukoumidis, Pei Zhang,...
The goal of secure multiparty computation is to transform a given protocol involving a trusted party into a protocol without need for the trusted party, by simulating the party am...
Abstract. Reputation systems help peers decide whom to trust before undertaking a transaction. Conventional approaches to reputation-based trust modeling assume that peers reputed ...
Gayatri Swamynathan, Ben Y. Zhao, Kevin C. Almerot...
In collusion-free protocols, subliminal communication is impossible and parties are thus unable to communicate “any information beyond what the protocol allows”. Collusion-fre...