Sciweavers

8243 search results - page 130 / 1649
» Can We Manage Trust
Sort
View
ACMICEC
2007
ACM
303views ECommerce» more  ACMICEC 2007»
14 years 2 months ago
Impact of social influence in e-commerce decision making
Purchasing decisions are often strongly influenced by people who the consumer knows and trusts. Moreover, many online shoppers tend to wait for the opinions of early adopters befo...
Young Ae Kim, Jaideep Srivastava
SEMWEB
2004
Springer
14 years 3 months ago
Personalized Reputation Management in P2P Networks
P2P networks have become increasingly popular in the recent years. However, their open, distributed and anonymous nature makes them very vulnerable against malicious users who prov...
Paul-Alexandru Chirita, Wolfgang Nejdl, Mario T. S...
ESAS
2007
Springer
14 years 4 months ago
Detecting Node Compromise in Hybrid Wireless Sensor Networks Using Attestation Techniques
Abstract. Node compromise is a serious threat in wireless sensor networks. Particular in networks which are organized in clusters, nodes acting as cluster heads for many cluster no...
Christoph Krauß, Frederic Stumpf, Claudia M....
VLDB
2004
ACM
134views Database» more  VLDB 2004»
14 years 3 months ago
A Privacy-Preserving Index for Range Queries
Database outsourcing is an emerging data management paradigm which has the potential to transform the IT operations of corporations. In this paper we address privacy threats in da...
Bijit Hore, Sharad Mehrotra, Gene Tsudik
CNSR
2004
IEEE
153views Communications» more  CNSR 2004»
14 years 1 months ago
An Authenticated Broadcasting Scheme for Wireless Ad Hoc Network
In this paper, we propose a pairing-based signcryption scheme for authenticated broadcasting, which requires less computation than a previously proposed scheme suggesting identity...
Muhammad J. Bohio, Ali Miri