Sciweavers

8243 search results - page 63 / 1649
» Can We Manage Trust
Sort
View
ICPADS
2007
IEEE
14 years 2 months ago
Statistical trust establishment in wireless sensor networks
Abstract— We present a new distributed approach that establishes reputation-based trust among sensor nodes in order to identify malfunctioning and malicious sensor nodes and mini...
Matthew J. Probst, Sneha Kumar Kasera
WINE
2007
Springer
182views Economy» more  WINE 2007»
14 years 1 months ago
Mechanism Design on Trust Networks
We introduce the concept of a trust network—a decentralized payment infrastructure in which payments are routed as IOUs between trusted entities. The trust network has directed ...
Arpita Ghosh, Mohammad Mahdian, Daniel M. Reeves, ...
MSOM
2007
118views more  MSOM 2007»
13 years 7 months ago
What Can Be Learned from Classical Inventory Models? A Cross-Industry Exploratory Investigation
: Classical inventory models offer a variety of insights into the optimal way to manage inventories of individual products. However, top managers and industry analysts are often co...
Sergey Rumyantsev, Serguei Netessine
INDOCRYPT
2004
Springer
14 years 1 months ago
New ID-Based Threshold Signature Scheme from Bilinear Pairings
ID-based public key systems allow the user to use his/her identity as the public key, which can simplify key management procedure compared with CA-based public key systems. However...
Xiaofeng Chen, Fangguo Zhang, Divyan M. Konidala, ...
DSOM
2003
Springer
14 years 27 days ago
Idiosyncratic Signatures for Authenticated Execution of Management Code
TrustedFlow™ is a software solution to the problem of remotely authenticating code during execution. A continuous flow of idiosyncratic signatures assures that the software from ...
Mario Baldi, Yoram Ofek, Moti Yung