Sciweavers

4111 search results - page 80 / 823
» Security, Protocols, and Trust
Sort
View
ICISC
2000
73views Cryptology» more  ICISC 2000»
13 years 11 months ago
A Multi-party Optimistic Non-repudiation Protocol
In this paper we consider the optimistic approach of the non-repudiation protocols. We study a non-repudiation protocol with off-line trusted third party and we keep on with the de...
Olivier Markowitch, Steve Kremer
ESAS
2007
Springer
14 years 4 months ago
Key Distribution in Mobile Ad Hoc Networks Based on Message Relaying
Abstract. Securing wireless mobile ad hoc networks (MANETs) is challenging due to the lack of centralized authority and poor connectivity. A key distribution mechanism is central t...
Johann van der Merwe, Dawoud S. Dawoud, Stephen Mc...
ICNP
2003
IEEE
14 years 3 months ago
On the Utility of Distributed Cryptography in P2P and MANETs: The Case of Membership Control
Peer-to-peer systems enable efficient resource aggregation and are inherently scalable since they do not depend on any centralized authority. However, lack of a centralized autho...
Maithili Narasimha, Gene Tsudik, Jeong Hyun Yi
ECR
2010
112views more  ECR 2010»
13 years 10 months ago
TREET: the Trust and Reputation Experimentation and Evaluation Testbed
Abstract To date, trust and reputation systems have often been evaluated using methods of their designers' own devising. Recently, we demonstrated that a number of noteworthy ...
Reid Kerr, Robin Cohen
IFIPTM
2009
149views Management» more  IFIPTM 2009»
13 years 7 months ago
An Experimental Testbed for Evaluation of Trust and Reputation Systems
Abstract. To date, trust and reputation systems have often been evaluated using methods of their designers' own devising. Recently, we demonstrated that a number of noteworthy...
Reid Kerr, Robin Cohen