Sciweavers

1351 search results - page 127 / 271
» Trust in Anonymity Networks
Sort
View
SAINT
2003
IEEE
14 years 3 months ago
Distributed Authentication for Peer-to-Peer Networks
A public key infrastructure is generally (and effectively) used for cryptographically secure authentication in the networks. Ad-hoc networks are formed in haphazard manner. Securi...
Shardul Gokhale, Partha Dasgupta
CCS
2006
ACM
14 years 1 months ago
Scalable group communication system for scalable trust
Programmers of large-scale trusted systems need tools to simplify tasks such as replicating services or data. Group communication systems achieve this via various flavors of relia...
Krzysztof Ostrowski, Kenneth P. Birman
IJMSO
2006
105views more  IJMSO 2006»
13 years 10 months ago
Trust network-based filtering of aggregated claims
: On the semantic web, assertions may be aggregated from many sources, those aggregations filtered, reasoned over, aggregated with other aggregators, displayed, scraped, extracted,...
Jennifer Golbeck, Bijan Parsia
IWC
2002
79views more  IWC 2002»
13 years 9 months ago
Trust in information sources: seeking information from people, documents, and virtual agents
The notion of trust has been virtually absent from most work on how people assess and choose their information sources. Based on two empirical cases this study shows that software ...
Morten Hertzum, Hans H. K. Andersen, Verner Anders...
WDAG
2007
Springer
105views Algorithms» more  WDAG 2007»
14 years 4 months ago
Rendezvous of Mobile Agents in Unknown Graphs with Faulty Links
A group of identical mobile agents moving asynchronously among the nodes of an anonymous network have to gather together in a single node of the graph. This problem known as the (a...
Jérémie Chalopin, Shantanu Das, Nico...