Sciweavers

836 search results - page 149 / 168
» Privacy and Trust in Distributed Networks
Sort
View
151
Voted
ATAL
2008
Springer
15 years 5 months ago
Tags and image scoring for robust cooperation
Establishing and maintaining cooperation is an enduring problem in multi-agent systems and, although several solutions exist, the increased use of online trading systems, peerto-p...
Nathan Griffiths
125
Voted
IJNSEC
2007
111views more  IJNSEC 2007»
15 years 3 months ago
A Novel Peer-to-peer Payment Protocol
In this paper a novel electronic payment protocol suitable for “peer-to-peer” (P2P) networks is presented. It implements electronic cash-based transactions, between buyers and...
Despoina Palaka, Petros Daras, Kosmas Petridis, Mi...
120
Voted
GLOBECOM
2008
IEEE
15 years 4 months ago
Evaluating P2PSIP under Attack: An Emulative Study
— Recently, establishing a VoIP call using a P2P network instead of regular SIP-servers has been proposed; this novel approach to SIP-signaling is commonly referred to as P2PSIP ...
Jan Seedorf, Frank Ruwolt, Martin Stiemerling, Sav...
116
Voted
CORR
2010
Springer
79views Education» more  CORR 2010»
15 years 3 months ago
A Multi-hop Multi-source Algebraic Watchdog
In our previous work (`An Algebraic Watchdog for Wireless Network Coding'), we proposed a new scheme in which nodes can detect malicious behaviors probabilistically, police th...
MinJi Kim, Muriel Médard, João Barro...
159
Voted
SIGCOMM
2009
ACM
15 years 10 months ago
Virtual individual servers as privacy-preserving proxies for mobile devices
People increasingly generate content on their mobile devices and upload it to third-party services such as Facebook and Google Latitude for sharing and backup purposes. Although t...
Ramón Cáceres, Landon P. Cox, Harold...