Sciweavers

8243 search results - page 101 / 1649
» Can We Manage Trust
Sort
View
IJNSEC
2011
232views more  IJNSEC 2011»
13 years 4 months ago
Location-aware, Trust-based Detection and Isolation of Compromised Nodes in Wireless Sensor Networks
The detection and isolation of compromised nodes in wireless sensor networks is a difficult task. However, failure to identify and isolate compromised nodes results in significan...
Garth V. Crosby, Lance Hester, Niki Pissinou
CHI
2001
ACM
14 years 9 months ago
Relational agents: a model and implementation of building user trust
Building trust with users is crucial in a wide range of applications, such as advice-giving or financial transactions, and some minimal degree of trust is required in all applicat...
Timothy W. Bickmore, Justine Cassell
IMC
2005
ACM
14 years 2 months ago
Perils of Transitive Trust in the Domain Name System
The Domain Name System, DNS, is based on nameserver delegations, which introduce complex and subtle dependencies between names and nameservers. In this paper, we present results f...
Venugopalan Ramasubramanian, Emin Gün Sirer
SP
2000
IEEE
14 years 1 months ago
An Efficient, Dynamic and Trust Preserving Public Key Infrastructure
Nested certification is a methodology for efficient certificate path verification. Nested certificates can be used together with classical certificates in the Public Key Infrastru...
Albert Levi, M. Ufuk Çaglayan
PRICAI
1999
Springer
14 years 1 months ago
Making Rational Decisions in N-by-N Negotiation Games with a Trusted Third Party
The optimal decision for an agent to make at a given game situation often depends on the decisions that other agents make at the same time. Rational agents will try to find a stabl...
Shih-Hung Wu, Von-Wun Soo