Sciweavers

2907 search results - page 8 / 582
» Trust analysis with clustering
Sort
View
SUTC
2006
IEEE
14 years 1 months ago
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation
Security in wireless ad hoc networks is hard to achieve due to the vulnerability of its links, limited physical protection, and the absence of a centralized management point. Cons...
Edith C. H. Ngai, Michael R. Lyu
ICCCN
2008
IEEE
14 years 2 months ago
Sources and Monitors: A Trust Model for Peer-to-Peer Networks
—In this paper, we introduce an objective model of trust in peer-to-peer networks. Based on this model, we develop protocols that can be used by the peers in a peer-to-peer netwo...
Yan Li, Mohamed G. Gouda
ATAL
2006
Springer
13 years 11 months ago
Monopolizing markets by exploiting trust
We investigate trust-based relationships in electronic supply chains where trust is a measure of consistency in meeting negotiated contract deadlines. We consider scenarios where ...
Sandip Sen, Dipyaman Banerjee
BIS
2008
134views Business» more  BIS 2008»
13 years 9 months ago
Trustlet, Open Research on Trust Metrics
A trust metric is a technique for predicting how much a user of a social network might trust another user. This is especially beneficial in situations where most users are unknown ...
Paolo Massa, Kasper Souren
TJS
2011
71views more  TJS 2011»
13 years 2 months ago
Automatically constructing trusted cluster computing environment
Yongwei Wu, Chen Gang, Jia Liu, Rui Fang, Xiaomeng...