Sciweavers

4111 search results - page 67 / 823
» Security, Protocols, and Trust
Sort
View
EUROPKI
2008
Springer
13 years 11 months ago
Trust-Rated Authentication for Domain-Structured Distributed Systems
Ralph Holz, Heiko Niedermayer, Peter Hauck, Georg ...
CRITIS
2007
13 years 11 months ago
An Approach to Trust Management Challenges for Critical Infrastructures
Ioanna Dionysiou, Deborah A. Frincke, David E. Bak...
KDD
2004
ACM
160views Data Mining» more  KDD 2004»
14 years 10 months ago
k-TTP: a new privacy model for large-scale distributed environments
Secure multiparty computation allows parties to jointly compute a function of their private inputs without revealing anything but the output. Theoretical results [2] provide a gen...
Bobi Gilburd, Assaf Schuster, Ran Wolff
CCS
2007
ACM
14 years 1 months ago
Offline untrusted storage with immediate detection of forking and replay attacks
We address the problem of using an untrusted server with only a trusted timestamping device (TTD) to provide trusted storage for a large number of clients, where each client may o...
Marten van Dijk, Jonathan Rhodes, Luis F. G. Sarme...
IFIPTM
2009
163views Management» more  IFIPTM 2009»
13 years 7 months ago
TrustBuilder2: A Reconfigurable Framework for Trust Negotiation
To date, research in trust negotiation has focused mainly on the theoretical aspects of the trust negotiation process, and the development of proof of concept implementations. Thes...
Adam J. Lee, Marianne Winslett, Kenneth J. Perano