Sciweavers

4111 search results - page 35 / 823
» Security, Protocols, and Trust
Sort
View
TPDS
2008
116views more  TPDS 2008»
13 years 8 months ago
Pseudo Trust: Zero-Knowledge Authentication in Anonymous P2Ps
Most trust models in Peer-to-Peer (P2P) systems are identity based, which means that in order for one peer to trust another, it needs to know the other peer's identity. Hence,...
Li Lu, Jinsong Han, Yunhao Liu, Lei Hu, Jinpeng Hu...
DIM
2007
ACM
14 years 19 days ago
Receipt management- transaction history based trust establishment
In a history-based trust-management system, users and service providers use information about past transactions to make trust-based decisions concerning current transactions. One ...
Abhilasha Bhargav-Spantzel, Jungha Woo, Elisa Bert...
CDC
2009
IEEE
135views Control Systems» more  CDC 2009»
14 years 1 months ago
Trust Estimation in autonomic networks: a statistical mechanics approach
— Trust management, broadly intended as the ability to maintain belief relationship among entities, is recognized as a fundamental security challenge for autonomous and selforgan...
Stefano Ermon, Luca Schenato, Sandro Zampieri
CNSR
2006
IEEE
14 years 2 months ago
Trusted Computing for Protecting Ad-hoc Routing
Ad-hoc networks rely on participation and cooperation of nodes within the network to transmit data to destinations. However, in networks where participating nodes are controlled b...
Michael Jarrett, Paul Ward
AINA
2007
IEEE
14 years 3 months ago
Trusted Gossip: A Rumor Resistant Dissemination Mechanism for Peer-to-Peer Information Sharing
Epidemic protocols such as gossip have proven to have many desirable properties for information sharing. However, trust is one of the issues that is yet to be examined with respec...
Arindam Mitra, Muthucumaru Maheswaran