We propose minimalist new hardware additions to a microprocessor chip that protect cryptographic keys in portable computing devices which are used in the field but owned by a cen...
We consider the problem of memory checking, where a user wants to maintain a large database on a remote server but has only limited local storage. The user wants to use the small ...
Cynthia Dwork, Moni Naor, Guy N. Rothblum, Vinod V...
Abstract—Trust is an important yet complex and little understood dyadic relation among actors in a social network. There are many dimensions to trust; trust plays an important ro...
Sibel Adali, Robert Escriva, Mark K. Goldberg, Myk...
— This paper analyzes a trust model for mobile ad hoc networks. We provide nodes with a mechanism to build a trust relationship with its neighbors. The proposed model considers t...
Pedro B. Velloso, Rafael P. Laufer, Otto Carlos Mu...
Trust plays important roles in diverse decentralized environments, including our society at large. Computational trust models help to, for instance, guide users’ judgements in o...
Xin Liu, Anwitaman Datta, Krzysztof Rzadca, Ee-Pen...