Sciweavers

1351 search results - page 21 / 271
» Trust in Anonymity Networks
Sort
View
SOCIALCOM
2010
13 years 5 months ago
q-Anon: Rethinking Anonymity for Social Networks
This paper proposes that social network data should be assumed public but treated private. Assuming this rather confusing requirement means that anonymity models such as kanonymity...
Aaron Beach, Mike Gartrell, Richard Han
AICT
2006
IEEE
14 years 1 months ago
Recipient Anonymity in a Structured Overlay
An open problem in structured overlay networks is related to the anonymity to be provided to recipients, namely, those nodes who respond to request messages. Such a feature is of ...
Giuseppe Ciaccio
NDSS
1999
IEEE
13 years 11 months ago
Practical Approach to Anonymity in Large Scale Electronic Voting Schemes
Anonymity of ballots in electronic voting schemes usually relies on the existence of some kind of anonymous channel between voters and ballot collecting authorities. Currently, th...
Andreu Riera, Joan Borrell
SECURWARE
2008
IEEE
14 years 1 months ago
Optimal Trust Network Analysis with Subjective Logic
Trust network analysis with subjective logic (TNA-SL) simplifies complex trust graphs into series-parallel graphs by removing the most uncertain paths to obtain a canonical graph...
Audun Jøsang, Touhid Bhuiyan
ICC
2007
IEEE
108views Communications» more  ICC 2007»
14 years 1 months ago
Trust Establishment in Distributed Networks: Analysis and Modeling
— Recently, trust establishment is recognized as an important approach to defend distributed networks, such as mobile ad hoc networks and sensor networks, against malicious attac...
Yan Lindsay Sun, Yafei Yang