Sciweavers

1139 search results - page 96 / 228
» Trust Management Survey
Sort
View
ICISC
2001
156views Cryptology» more  ICISC 2001»
13 years 9 months ago
A Distributed Light-Weight Authentication Model for Ad-hoc Networks
Abstract. In this work we present a security model for low-value transactions in ad-hoc networks in which we focus on authentication since this is the core requirement for commerci...
André Weimerskirch, Gilles Thonet
PUC
2008
99views more  PUC 2008»
13 years 7 months ago
An empirical investigation of mobile ticketing service adoption in public transportation
In this paper, we present results from a study of mobile ticketing service adoption in public transportation. The theoretical background of the study is based on technology adoptio...
Niina Mallat, Matti Rossi, Virpi Kristiina Tuunain...
IEEEIAS
2008
IEEE
14 years 2 months ago
A Device Management Framework for Secure Ubiquitous Service Delivery
In a mobile ubiquitous environment, service interactions between a user device and a service provider should be secure, regardless of the type of device used to access or consume ...
Adrian Leung, Chris J. Mitchell
ATAL
2004
Springer
14 years 1 months ago
Temptation and Contribution in C2C Transactions: Implications for Designing Reputation Management Systems
: A reputation management system can promote trust in transactions in an online consumer-to-consumer (C2C) market. We model a C2C market by employing an agent-based approach. To di...
Hitoshi Yamamoto, Kazunari Ishida, Toshizumi Ohta
ICWS
2007
IEEE
13 years 9 months ago
A Model to support SPKI Federations management through XKMS
The purpose of the XML Key Management Specification (XKMS) is to facilitate the use of a Public Key Infrastructure (PKI) by transferring the complexity associated with PKI to a t...
Michelle S. Wangham, Emerson Ribeiro de Mello, Jon...