Sciweavers

1351 search results - page 128 / 271
» Trust in Anonymity Networks
Sort
View
PRIMA
2009
Springer
14 years 4 months ago
A Multiagent Model for Provider-Centered Trust in Composite Web Services
Service-Oriented Architectures (SOA) provide infrastructures to make resources available to other participants in the network as independent services. However, service providers, n...
Julien Bourdon, Laurent Vercouter, Toru Ishida
ERCIMDL
2007
Springer
129views Education» more  ERCIMDL 2007»
14 years 4 months ago
Know Thy Sensor: Trust, Data Quality, and Data Integrity in Scientific Digital Libraries
For users to trust and interpret the data in scientific digital libraries, they must be able to assess the integrity of those data. Criteria for data integrity vary by context, by ...
Jillian C. Wallis, Christine L. Borgman, Matthew S...
ESORICS
2006
Springer
14 years 1 months ago
Timing Analysis in Low-Latency Mix Networks: Attacks and Defenses
Abstract. Mix networks are a popular mechanism for anonymous Internet communications. By routing IP traffic through an overlay chain of mixes, they aim to hide the relationship bet...
Vitaly Shmatikov, Ming-Hsiu Wang
SIGMOD
2010
ACM
274views Database» more  SIGMOD 2010»
14 years 2 months ago
K-isomorphism: privacy preserving network publication against structural attacks
Serious concerns on privacy protection in social networks have been raised in recent years; however, research in this area is still in its infancy. The problem is challenging due ...
James Cheng, Ada Wai-Chee Fu, Jia Liu
CORR
2010
Springer
152views Education» more  CORR 2010»
13 years 8 months ago
A new key establishment scheme for wireless sensor networks
Traditional key management techniques, such as public key cryptography or key distribution center (e.g., Kerberos), are often not effective for wireless sensor networks for the se...
Eric Ke Wang, Lucas Chi Kwong Hui, Siu-Ming Yiu