Sciweavers

1139 search results - page 57 / 228
» Trust Management Survey
Sort
View
HICSS
2009
IEEE
108views Biometrics» more  HICSS 2009»
14 years 3 months ago
E-File Adoption: A Study of U.S. Taxpayers' Intentions
In the United States, congress has set goals for the diffusion of e-government initiatives. One of congress’ goals for 2007 was for 80% of tax and informational returns to be fil...
L. Christian Schaupp, Lemuria Carter, Jeff Hobbs
EOR
2008
268views more  EOR 2008»
13 years 8 months ago
A survey of scheduling problems with setup times or costs
The first comprehensive survey paper on scheduling problems with separate setup times or costs was conducted by [Allahverdi, A., Gupta, J.N.D., Aldowaisan, T., 1999. A review of s...
Ali Allahverdi, C. T. Ng, T. C. Edwin Cheng, Mikha...
TPDS
2008
116views more  TPDS 2008»
13 years 8 months ago
Pseudo Trust: Zero-Knowledge Authentication in Anonymous P2Ps
Most trust models in Peer-to-Peer (P2P) systems are identity based, which means that in order for one peer to trust another, it needs to know the other peer's identity. Hence,...
Li Lu, Jinsong Han, Yunhao Liu, Lei Hu, Jinpeng Hu...
DSOM
2003
Springer
14 years 1 months ago
Idiosyncratic Signatures for Authenticated Execution of Management Code
TrustedFlow™ is a software solution to the problem of remotely authenticating code during execution. A continuous flow of idiosyncratic signatures assures that the software from ...
Mario Baldi, Yoram Ofek, Moti Yung
WWW
2003
ACM
14 years 9 months ago
The Eigentrust algorithm for reputation management in P2P networks
Peer-to-peer file-sharing networks are currently receiving much attention as a means of sharing and distributing information. However, as recent experience shows, the anonymous, o...
Sepandar D. Kamvar, Mario T. Schlosser, Hector Gar...