Sciweavers

1351 search results - page 103 / 271
» Trust in Anonymity Networks
Sort
View
ICC
2008
IEEE
133views Communications» more  ICC 2008»
14 years 4 months ago
A Dynamic Trust Management Scheme to Mitigate Malware Proliferation in P2P Networks
—The recent surge of peer-to-peer (P2P) networks consisting of thousands of of hosts makes them a breeding ground for malware proliferation. Although some existing studies have s...
Xuhua Ding, Wei Yu, Ying Pan
PDCAT
2005
Springer
14 years 3 months ago
Trusted Computing-Based Security Architecture For 4G Mobile Networks
In this paper security requirements and security architecture for 4G systems are presented with the consideration of Trusted Computing (TC) for mobile equipment (ME). The security...
Yu Zheng, Dake He, Weichi Yu, Xiaohu Tang
HICSS
2002
IEEE
148views Biometrics» more  HICSS 2002»
14 years 3 months ago
Barriers to a Wide-Area Trusted Network Early Warning System for Electric Power Disturbances
It is apparent that perturbations of the North American electric power grid follow the patterns and characteristics of Self Organized Critical (SOC) systems. Published studies sho...
Paul W. Oman, Jeff Roberts
ICDCSW
2007
IEEE
14 years 4 months ago
Survey of Six Myths and Oversights about Distributed Hash Tables' Security
Distributed Hash Tables (DHT) was not designed to be secure against malicious users. But some secure systems like trust and reputation management algorithms trust DHT with their d...
Sylvain Dahan, Mitsuhisa Sato
WWW
2005
ACM
14 years 10 months ago
TrustGuard: countering vulnerabilities in reputation management for decentralized overlay networks
Reputation systems have been popular in estimating the trustworthiness and predicting the future behavior of nodes in a large-scale distributed system where nodes may transact wit...
Mudhakar Srivatsa, Li Xiong, Ling Liu