Sciweavers

8243 search results - page 103 / 1649
» Can We Manage Trust
Sort
View
SIGECOM
1999
ACM
105views ECommerce» more  SIGECOM 1999»
14 years 1 months ago
Nark: receiver-based multicast non-repudiation and key management
The goal of this work is to separately control individual secure sessions between unlimited pairs of multicast receivers and senders while preserving the scalability of receiver i...
Bob Briscoe, Ian Fairman
IWNAS
2008
IEEE
14 years 3 months ago
Event-based Trust Framework Model in Wireless Sensor Networks
The security of wireless sensor networks is ever more important nowadays. Most of the proposed security protocols in wireless sensor networks are based on authentication and encry...
Haiguang Chen, Huafeng Wu, Jinchu Hu, Chuanshan Ga...
SP
2010
IEEE
157views Security Privacy» more  SP 2010»
14 years 27 days ago
Bootstrapping Trust in Commodity Computers
Trusting a computer for a security-sensitive task (such as checking email or banking online) requires the user to know something about the computer’s state. We examine research ...
Bryan Parno, Jonathan M. McCune, Adrian Perrig
ATAL
2008
Springer
13 years 11 months ago
Extending virtual organizations to improve trust mechanisms
Virtual Organizations (VOs) are becoming an increasingly important research topic in the field of Multi-Agent Systems (MAS). The problem of selecting suitable counterparts to inte...
Ramón Hermoso, Roberto Centeno, Holger Bill...
COMCOM
2000
79views more  COMCOM 2000»
13 years 8 months ago
Jikzi - a new framework for security policy, trusted publishing and electronic commerce
In this paper, we describe a thread of research which we have followed off and on at Cambridge for about three years. Our topic is the security of electronic documents, in the bro...
Ross J. Anderson, Jong-Hyeon Lee