Sciweavers

3299 search results - page 49 / 660
» Privacy and Trusted Computing
Sort
View
104
Voted
SPW
2004
Springer
15 years 8 months ago
Pseudonymity in the Light of Evidence-Based Trust
This position paper discusses the relation of privacy, namely pseudonymity, to evidence-based trust (or rather reputation). Critical concepts of evidence-based trust/reputation sys...
Daniel Cvrcek, Václav Matyás Jr.
115
Voted
ESORICS
2009
Springer
15 years 9 months ago
Using SAT-Solvers to Compute Inference-Proof Database Instances
Cornelia Tadros, Lena Wiese
80
Voted
ACISP
2008
Springer
15 years 9 months ago
A Tree-Based Approach for Computing Double-Base Chains
Christophe Doche, Laurent Habsieger
116
Voted
CSFW
1997
IEEE
15 years 7 months ago
Unreliable Intrusion Detection in Distributed Computations
Dahlia Malkhi, Michael K. Reiter