Sciweavers

1139 search results - page 24 / 228
» Trust Management Survey
Sort
View
CSREASAM
2004
13 years 9 months ago
The Key Authority - Secure Key Management in Hierarchical Public Key Infrastructures
We model a private key's life cycle as a finite state machine. The states are the key's phases of life and the transition functions describe tasks to be done with the key...
Alexander Wiesmaier, Marcus Lippert, Vangelis Kara...
IMC
2005
ACM
14 years 1 months ago
Perils of Transitive Trust in the Domain Name System
The Domain Name System, DNS, is based on nameserver delegations, which introduce complex and subtle dependencies between names and nameservers. In this paper, we present results f...
Venugopalan Ramasubramanian, Emin Gün Sirer
JSW
2008
127views more  JSW 2008»
13 years 7 months ago
A Trust Based System for Enhanced Spam Filtering
The effectiveness of current anti-spam systems is limited by the ability of spammers to adapt to filtering techniques and the lack of incentive for mail servers to filter outgoing ...
Jimmy McGibney, Dmitri Botvich
NETWORK
2008
94views more  NETWORK 2008»
13 years 7 months ago
A Survey of Mobility Management in Hybrid Wireless Mesh Networks
Mobility management is vital for realizing large-scale wireless mesh networks to provide cost-effective broadband Internet access. Although a considerable amount of research on mo...
Jiang Xie, Xudong Wang
JAIR
2010
158views more  JAIR 2010»
13 years 6 months ago
A Survey of Paraphrasing and Textual Entailment Methods
Paraphrasing methods recognize, generate, or extract phrases, sentences, or longer natural language expressions that convey almost the same information. Textual entailment methods...
Ion Androutsopoulos, Prodromos Malakasiotis