Sciweavers

1351 search results - page 113 / 271
» Trust in Anonymity Networks
Sort
View
FC
2009
Springer
93views Cryptology» more  FC 2009»
14 years 4 months ago
Detecting Denial of Service Attacks in Tor
Abstract. Tor is currently one of the more popular systems for anonymizing near real-time communications on the Internet. Recently, Borisov et al. proposed a denial of service base...
Norman Danner, Danny Krizanc, Marc Liberatore
CSE
2008
IEEE
14 years 4 months ago
A Trust Model Applied to E-mail Servers
E-mail services are essential in the Internet. However, the basic e-mail architecture presents problems that opens it to several threats. Alternatives have been proposed to solve ...
Leonardo de Oliveira, Carlos Maziero
IEEEARES
2008
IEEE
14 years 4 months ago
Making Multi-Dimensional Trust Decisions on Inter-Enterprise Collaborations
—Enterprise computing is moving towards more open, collaborative systems. Joining a business network must be made efficient, despite the technical and semantic interoperability ...
Sini Ruohomaa, Lea Kutvonen
AIR
2005
158views more  AIR 2005»
13 years 10 months ago
Review on Computational Trust and Reputation Models
The scientific research in the area of computational mechanisms for trust and reputation in virtual societies is a recent discipline oriented to increase the reliability and perfor...
Jordi Sabater, Carles Sierra
AINA
2011
IEEE
13 years 1 months ago
Identity Support in a Security and Trust Service for Ad Hoc M-commerce Trading Systems
– Ad hoc m-commerce is an emerging way of conducting online trading wirelessly within dynamic network communities. However, participants in such systems are vulnerable to attacks...
Husna Osman, Hamish Taylor