Sciweavers

4263 search results - page 791 / 853
» Network Security
Sort
View
WECWIS
2003
IEEE
205views ECommerce» more  WECWIS 2003»
14 years 3 months ago
Beyond "web of trust": Enabling P2P E-commerce
The huge success of eBay has proven the demand for customer-to-customer (C2C) electronic commerce. eBay is a centralized infrastructure with all its scalability problems (network ...
Anwitaman Datta, Manfred Hauswirth, Karl Aberer
ACISP
1997
Springer
14 years 2 months ago
Enabling Technology for the Trading of MPEG-encoded Video
tracts, pp. 11-17. (http://www.qucis.queens.ca/achallc97/papers/p028.html) Alexa, Melina; Rostek, Lothar Pattern Concordances - TATOE calls XGrammar. Presented at ACH -ALLC97, King...
Jana Dittmann, Arnd Steinmetz
P2P
2007
IEEE
165views Communications» more  P2P 2007»
14 years 4 months ago
An Information-Theoretic Framework for Analyzing Leak of Privacy in Distributed Hash Tables
An important security issue in DHT-based structured overlay networks is to provide anonymity to the storage nodes. Compromised routing tables in those DHTs leak information about ...
Souvik Ray, Zhao Zhang
HICSS
2005
IEEE
163views Biometrics» more  HICSS 2005»
14 years 3 months ago
PET: A PErsonalized Trust Model with Reputation and Risk Evaluation for P2P Resource Sharing
— Building a good cooperation in the P2P resource sharing is a fundamental and challenging research topic because of peer anonymity, peer independence, high dynamics of peer beha...
Zhengqiang Liang, Weisong Shi
DIM
2007
ACM
14 years 2 months ago
Linkability estimation between subjects and message contents using formal concepts
In this paper, we examine how conclusions about linkability threats can be drawn by analyzing message contents and subject knowledge in arbitrary communication systems. At first, ...
Stefan Berthold, Sebastian Clauß