Sciweavers

3299 search results - page 93 / 660
» Privacy and Trusted Computing
Sort
View
VISSYM
2007
13 years 11 months ago
TrustNeighborhoods: Visualizing Trust in Distributed File Sharing Systems
We present TrustNeighborhoods, a security trust visualization for situational awareness on the Internet aimed at novice and intermediate users of a distributed file sharing system...
Niklas Elmqvist, Philippas Tsigas
CIKM
2009
Springer
14 years 3 months ago
StereoTrust: a group based personalized trust model
Trust plays important roles in diverse decentralized environments, including our society at large. Computational trust models help to, for instance, guide users’ judgements in o...
Xin Liu, Anwitaman Datta, Krzysztof Rzadca, Ee-Pen...
CHI
2003
ACM
14 years 9 months ago
Shiny happy people building trust?: photos on e-commerce websites and consumer trust
Designing for trust in technology-mediated interaction is an increasing concern in CHI. In advertising, images of people have long been used to create positive attitudes to produc...
Jens Riegelsberger, Martina Angela Sasse, John D. ...
WETICE
2002
IEEE
14 years 1 months ago
A Strong Proxy Signature Scheme with Proxy Signer Privacy Protection
In 1996, Mambo et al. first introduced the concept of a proxy signature scheme, and discussed the delegation of the signing capability to a proxy signer. In 2001, Lee et al. cons...
K. Shum, Victor K. Wei
FC
2006
Springer
119views Cryptology» more  FC 2006»
14 years 15 days ago
Auditable Privacy: On Tamper-Evident Mix Networks
Abstract. We introduce the notion of tamper-evidence for mix networks in order to defend against attacks aimed at covertly leaking secret information held by corrupted mix servers....
Jong Youl Choi, Philippe Golle, Markus Jakobsson