Sciweavers

1351 search results - page 15 / 271
» Trust in Anonymity Networks
Sort
View
NDSS
2008
IEEE
14 years 1 months ago
Taming the Devil: Techniques for Evaluating Anonymized Network Data
Anonymization plays a key role in enabling the public release of network datasets, and yet there are few, if any, techniques for evaluating the efficacy of network data anonymiza...
Scott E. Coull, Charles V. Wright, Angelos D. Kero...
ACSAC
2002
IEEE
14 years 14 days ago
Networking in The Solar Trust Model: Determining Optimal Trust Paths in a Decentralized Trust Network
The Solar Trust Model provides a method by which the sender of a message can be authenticated, and the level of trust that can be placed in the sender of the message or the messag...
Michael Clifford
AINA
2009
IEEE
14 years 2 months ago
A Property Based Framework for Trust and Reputation in Mobile Computing
In this paper we reinforce the benefits of a trust based approach in mobile multi-agent systems. Whilst we do not specify a trust model we provide a framework for property based ...
Kevin Jones, Helge Janicke, Antonio Cau
PKC
1999
Springer
86views Cryptology» more  PKC 1999»
13 years 11 months ago
Preserving Privacy in Distributed Delegation with Fast Certificates
Abstract. In a distributed system, dynamically dividing execution between nodes is essential for service robustness. However, when all of the nodes cannot be equally trusted, and w...
Pekka Nikander, Yki Kortesniemi, Jonna Partanen
SUTC
2006
IEEE
14 years 1 months ago
DynamicTrust: The Trust Development in Peer-to-Peer Environments
In peer-to-peer (P2P) environments, trust is a very important issue when transactions/interactions occur between peers. In general, the trust evaluation on transactions/interactio...
Yang Wang, Vijay Viradharajan