Sciweavers

4111 search results - page 6 / 823
» Security, Protocols, and Trust
Sort
View
ICDCS
2007
IEEE
14 years 1 months ago
Supporting Robust and Secure Interactions in Open Domains through Recovery of Trust Negotiations
Trust negotiation supports authentication and access control across multiple security domains by allowing parties to use non-forgeable digital credentials to establish trust. By t...
Anna Cinzia Squicciarini, Alberto Trombetta, Elisa...
JSAC
2006
111views more  JSAC 2006»
13 years 7 months ago
On trust models and trust evaluation metrics for ad hoc networks
Within the realm of network security, we interpret the concept of trust as a relation among entities that participate in various protocols. Trust relations are based on evidence cr...
George Theodorakopoulos, John S. Baras
AGENTS
2001
Springer
13 years 12 months ago
Trust-based facilitator for e-partnerships
In this paper, we propose a facilitator that finds capable and trustworthy partners on behalf of client users, which helps users form and maintain e-partnerships for electronic co...
Chihiro Ono, Boyd C. Paulson Jr., Dai Kanetomo, Ma...
AINA
2007
IEEE
14 years 1 months ago
Random Oracle Instantiation in Distributed Protocols Using Trusted Platform Modules
The random oracle model is an idealized theoretical model that has been successfully used for designing many cryptographic algorithms and protocols. Unfortunately, a series of res...
Vandana Gunupudi, Stephen R. Tate
JCM
2008
73views more  JCM 2008»
13 years 7 months ago
Secure and Distributed P2P Reputation Management
The open, sharing and anonymous nature of peer-to-peer (P2P) network has offered opportunities and threats for the development of distributed computing technology. One feasible way...
Jianli Hu, Quanyuan Wu, Bin Zhou