Sciweavers

949 search results - page 34 / 190
» Design methods for security and trust
Sort
View
WISEC
2010
ACM
14 years 2 months ago
On the tradeoff between trust and privacy in wireless ad hoc networks
As privacy moves to the center of attention in networked systems, and the need for trust remains a necessity, an important question arises: How do we reconcile the two seemingly c...
Maxim Raya, Reza Shokri, Jean-Pierre Hubaux
ZUM
2000
Springer
13 years 11 months ago
Formal Methods for Industrial Products
We have recently completed the specication and security proof of a large, industrial scale application. The application is security critical, and the modelling and proof were done ...
Susan Stepney, David Cooper
WWW
2010
ACM
13 years 6 months ago
A framework for trust establishment and assessment on the web of data
With the enormous and still growing amount of data and user interaction on the Web, it becomes more and more necessary for data consumers to be able to assess the trustworthiness ...
Qi Gao, Geert-Jan Houben
CN
2006
81views more  CN 2006»
13 years 8 months ago
Taxonomy of trust: Categorizing P2P reputation systems
The field of peer-to-peer reputation systems has exploded in the last few years. Our goal is to organize existing ideas and work to facilitate system design. We present a taxonomy...
Sergio Marti, Hector Garcia-Molina
CASES
2010
ACM
13 years 5 months ago
Hardware trust implications of 3-D integration
3-D circuit-level integration is a chip fabrication technique in which two or more dies are stacked and combined into a single circuit through the use of vertical electroconductiv...
Ted Huffmire, Timothy E. Levin, Michael Bilzor, Cy...