Many reputation management systems have been developed under the assumption that each entity in the system will use a variant of the same scoring function. Much of the previous wo...
William Conner, Arun Iyengar, Thomas A. Mikalsen, ...
The current generation of ad hoc networks relies on other nodes in the network for routing information and for routing the packets. These networks are based on the fundamental ass...
Group key exchange protocols allow their participants to compute a secret key which can be used to ensure security and privacy for various multi-party applications. The resulting g...
In open environments in which autonomous agents can break contracts, computational models of trust have an important role to play in determining who to interact with and how inter...
Sarvapali D. Ramchurn, Nicholas R. Jennings, Carle...