Sciweavers

1351 search results - page 131 / 271
» Trust in Anonymity Networks
Sort
View
IFIP11
2004
109views Business» more  IFIP11 2004»
13 years 11 months ago
Taxonomy of Mixes and Dummy Traffic
This paper presents an analysis of mixes and dummy traffic policies, which are building blocks of anonymous services. The goal of the paper is to bring together all the issues rela...
Claudia Díaz, Bart Preneel
WWW
2008
ACM
14 years 10 months ago
Planetary-scale views on a large instant-messaging network
We present a study of anonymized data capturing a month of high-level communication activities within the whole of the Microsoft Messenger instant-messaging system. We examine cha...
Jure Leskovec, Eric Horvitz
JNW
2008
116views more  JNW 2008»
13 years 8 months ago
Scalable Revocation in Hybrid Ad Hoc Networks: The SHARL Scheme
The article proposes a simple, scalable and robust scheme for the distribution of revocation information in mobile ad hoc networks (MANETs). The scheme is intended for ad hoc netwo...
Mona Holsve Ofigsbø, Anne Marie Hegland, P&...
SAC
2009
ACM
14 years 2 months ago
Towards developing a trust-based security solution
Wireless sensor network has emerged as a new information and data gathering paradigm based on the collaborative efforts of a large number of autonomous sensing devices. With small...
Sheikh Iqbal Ahamed, Donghyun Kim, Chowdhury Shari...
PLDI
2006
ACM
14 years 4 months ago
Specifying distributed trust management in LolliMon
We propose the monadic linear logic programming language LolliMon as a new foundation for the specification of distributed trust management systems, particularly the RT framework...
Jeff Polakow, Christian Skalka