Sciweavers

2821 search results - page 91 / 565
» To Trust or Not to Trust
Sort
View
TRUST
2010
Springer
14 years 1 months ago
Token-Based Cloud Computing
Secure outsourcing of computation to an untrusted (cloud) service provider is becoming more and more important. Pure cryptographic solutions based on fully homomorphic and verifia...
Ahmad-Reza Sadeghi, Thomas Schneider 0003, Marcel ...
ATAL
2005
Springer
14 years 2 months ago
A real-world approach to secure and trusted negotiation in MASs
The problem of providing tools to support legally valid negotiations between agents is becoming more and more critical. Agents are supposed to perform crucial tasks autonomously; ...
Roberto Bianchi, Andrea Fontana, Federico Bergenti
ATAL
2010
Springer
13 years 10 months ago
Combining statistics and arguments to compute trust
We propose a method for constructing Dempster-Shafer belief functions modeling the trust of a given agent (the evaluator) in another (the target) by combining statistical informat...
Paul-Amaury Matt, Maxime Morge, Francesca Toni
JUCS
2010
98views more  JUCS 2010»
13 years 7 months ago
Toward an Understanding of the Mediating Role of "Trust" in Mobile Banking Service: An Empirical Test of Indonesia Case
: Mobile banking has been considered to be one of the most value-added and important mobile services currently available. Considering the fact that the penetration of this technolo...
Chulmo Koo, Yulia Wati
CORR
2006
Springer
97views Education» more  CORR 2006»
13 years 9 months ago
Trusted Computing in Mobile Action
Due to the convergence of various mobile access technologies like UMTS, WLAN, and WiMax the need for a new supporting infrastructure arises. This infrastructure should be able to ...
Nicolai Kuntze, Andreas U. Schmidt