Sciweavers

712 search results - page 24 / 143
» Trust Management and Network Layer Security Protocols
Sort
View
ICIP
2008
IEEE
14 years 10 months ago
Managing privacy data in pervasive camera networks
Privacy protection of visual information is increasingly important as pervasive camera networks becomes more prevalent. The proposed scheme addresses the problem of preserving and...
Sen-Ching S. Cheung, Jithendra K. Paruchuri, Thinh...
ECR
2006
81views more  ECR 2006»
13 years 8 months ago
Reputation management and signature delegation: A distributed approach
In this paper, we present a novel protocol, called Distributed Signcryption with Verifiable Partial Signature (DiSigncryption) protocol, to allow an agent owner to securely distrib...
Omaima Bamasak, Ning Zhang
SIGECOM
2009
ACM
117views ECommerce» more  SIGECOM 2009»
14 years 3 months ago
Sybilproof transitive trust protocols
We study protocols to enable one user (the principal) to make potentially profitable but risky interactions with another user (the agent), in the absence of direct trust between ...
Paul Resnick, Rahul Sami
NOMS
1998
IEEE
154views Communications» more  NOMS 1998»
14 years 29 days ago
A framework for end-to-end proactive network management
Current advances in networking, computing, software and web technologies have led to an explosive growth in the development of networked applications. Management of large-scale ne...
Salim Hariri, Yoonhee Kim, K. Varshney, R. Kaminsk...
NOSSDAV
2009
Springer
14 years 3 months ago
Probabilistic event resolution with the pairwise random protocol
Peer-to-peer distributed virtual environments (DVE's) distribute state tracking and state transitions. Many DVE's - such as online games - require ways to fairly determi...
John L. Miller, Jon Crowcroft