Sciweavers

1351 search results - page 134 / 271
» Trust in Anonymity Networks
Sort
View
ICN
2005
Springer
14 years 3 months ago
Scalable Group Key Management with Partially Trusted Controllers
Abstract. Scalable group key management solutions are crucial for supporting Internet applications that are based on a group communication model. Many solutions have been proposed ...
Himanshu Khurana, Rafael Bonilla, Adam J. Slagell,...
ICWSM
2009
13 years 7 months ago
A Comparative Analysis of Trust-Enhanced Recommenders for Controversial Items
A particularly challenging task for recommender systems (RSs) is deciding whether to recommend an item that received a variety of high and low scores from its users. RSs that inco...
Patricia Victor, Chris Cornelis, Martine De Cock, ...
CSE
2009
IEEE
14 years 4 months ago
Surfing a Web of Trust: Reputation and Reciprocity on CouchSurfing.com
—Reputation mechanisms are essential for online transactions, where the parties have little prior experience with one another. This is especially true when transactions result in...
Debra Lauterbach, Hung Truong, Tanuj Shah, Lada A....
SP
2009
IEEE
155views Security Privacy» more  SP 2009»
14 years 4 months ago
A Logic of Secure Systems and its Application to Trusted Computing
We present a logic for reasoning about properties of secure systems. The logic is built around a concurrent programming language with constructs for modeling machines with shared ...
Anupam Datta, Jason Franklin, Deepak Garg, Dilsun ...
IEEEIAS
2008
IEEE
14 years 4 months ago
Geolocation-Based Trust for Vanet's Privacy
: Research in Vehicular Ad Hoc NETworks (VANETs) has evolved considerably over the last years. Security and privacy in VANETs have recently appealed special interest in the researc...
Jetzabel Serna, Jesus Luna, Manel Medina