Sciweavers

1351 search results - page 118 / 271
» Trust in Anonymity Networks
Sort
View
ESAS
2007
Springer
14 years 4 months ago
Detecting Node Compromise in Hybrid Wireless Sensor Networks Using Attestation Techniques
Abstract. Node compromise is a serious threat in wireless sensor networks. Particular in networks which are organized in clusters, nodes acting as cluster heads for many cluster no...
Christoph Krauß, Frederic Stumpf, Claudia M....
CN
2006
99views more  CN 2006»
13 years 10 months ago
P2P reputation management: Probabilistic estimation vs. social networks
Managing trust is a key issue for a wide acceptance of P2P computing, particularly in critical areas such as e-commerce. Reputation-based trust management has been identified in t...
Zoran Despotovic, Karl Aberer
CMG
2004
13 years 11 months ago
Generating Realistic TCP Workloads
The workload of a network is usually a heterogeneous aggregate of services and applications, driven by a large number of users. This complexity makes it challenging to evaluate th...
Félix Hernández-Campos, F. Donelson ...
NSDI
2008
14 years 12 days ago
Ostra: Leveraging Trust to Thwart Unwanted Communication
Online communication media such as email, instant messaging, bulletin boards, voice-over-IP, and social networking sites allow any sender to reach potentially millions of users at...
Alan Mislove, Ansley Post, Peter Druschel, P. Kris...
USS
2008
14 years 12 days ago
Verifying Compliance of Trusted Programs
In this paper, we present an approach for verifying that trusted programs correctly enforce system security goals when deployed. A trusted program is trusted to only perform safe ...
Sandra Rueda, Dave King 0002, Trent Jaeger