Sciweavers

8655 search results - page 91 / 1731
» Challenges for Trusted Computing
Sort
View
HICSS
2005
IEEE
163views Biometrics» more  HICSS 2005»
14 years 2 months ago
PET: A PErsonalized Trust Model with Reputation and Risk Evaluation for P2P Resource Sharing
— Building a good cooperation in the P2P resource sharing is a fundamental and challenging research topic because of peer anonymity, peer independence, high dynamics of peer beha...
Zhengqiang Liang, Weisong Shi
ATAL
2008
Springer
13 years 11 months ago
Towards Improved Partner Selection Using Recommendations and Trust
Agents in open and dynamic environments face the challenge of uncertainty while interacting with others to achieve their goals. They face quick and unforeseen changes to the behavi...
Sarah N. Lim Choi Keung, Nathan Griffiths
ICDIM
2010
IEEE
13 years 6 months ago
Social network collaborative filtering framework and online trust factors: A case study on Facebook
Recommender systems have been proposed to exploit the potential of social network by filtering the information and offer recommendations to a user that he is predicted to like. Co...
Wei Chen, Simon Fong
COMPSAC
2003
IEEE
14 years 2 months ago
Facilitating Secure Ad hoc Service Discovery in Public Environments
Securely accessing unfamiliar services in public environments using ad hoc wireless networks is challenging. We present a proxy-based approach that uses other existing network cha...
Feng Zhu, Matt W. Mutka, Lionel M. Ni
TRUST
2010
Springer
14 years 2 months ago
Oblivious Transfer Based on Physical Unclonable Functions
us Transfer based on Physical Unclonable Functions (Extended Abstract)" Session 2 (Tuesday 15:00 - 16:30) Place: „Salon Tiergarten“ 15:00-15:30 Patrick Koeberl (Intel; Ire...
Ulrich Rührmair