Sciweavers

671 search results - page 122 / 135
» Trust evaluation in ad-hoc networks
Sort
View
ICISC
2008
103views Cryptology» more  ICISC 2008»
14 years 10 days ago
Generalized Universal Circuits for Secure Evaluation of Private Functions with Application to Data Classification
Secure Evaluation of Private Functions (PF-SFE) allows two parties to compute a private function which is known by one party only on private data of both. It is known that PF-SFE c...
Ahmad-Reza Sadeghi, Thomas Schneider 0003
IPPS
2006
IEEE
14 years 5 months ago
Neighbourhood maps: decentralised ranking in small-world P2P networks
Reputation in P2P networks is an important tool to encourage cooperation among peers. It is based on ranking of peers according to their past behaviour. In large-scale real world ...
Matteo Dell'Amico
WIMOB
2008
IEEE
14 years 5 months ago
A Protocol for Pervasive Distributed Computing Reliability
Abstract—The adoption of new hardware and software architectures will make future generations of pervasive devices more flexible and extensible. Networks of computational nodes ...
Alberto Ferrante, Roberto Pompei, Anastasia Stulov...
INFOSCALE
2009
ACM
14 years 5 months ago
A Lightweight Mechanism to Mitigate Application Layer DDoS Attacks
Abstract. Application layer DDoS attacks, to which network layer solutions is not applicable as attackers are indistinguishable based on packets or protocols, prevent legitimate us...
Jie Yu, Chengfang Fang, Liming Lu, Zhoujun Li
CIA
2004
Springer
14 years 4 months ago
Collaboration Analysis in Recommender Systems Using Social Networks
Abstract. Many researchers have focused their efforts on developing collaborative recommender systems. It has been proved that the use of collaboration in such systems improves per...
Jordi Palau, Miquel Montaner, Beatriz López...