Sciweavers

1351 search results - page 22 / 271
» Trust in Anonymity Networks
Sort
View
JCP
2008
104views more  JCP 2008»
13 years 7 months ago
Trusted Decision Mechanism Based on Fuzzy Logic for Open Network
Trust mechanism will be an important trend in the field of security for open network. But, as an important factor risk is little considered in trust model. In this paper, Further w...
Lin Zhang, Ruchuan Wang, Haiyan Wang
ISCC
2005
IEEE
14 years 1 months ago
Mobility Changes Anonymity: Mobile Ad Hoc Networks Need Efficient Anonymous Routing
Jiejun Kong, Xiaoyan Hong, M. Y. Sanadidi, Mario G...
NDSS
2002
IEEE
14 years 13 days ago
Advanced Client/Server Authentication in TLS
Many business transactions on the Internet occur between strangers, that is, between entities with no prior relationship and no common security domain. Traditional security approa...
Adam Hess, Jared Jacobson, Hyrum Mills, Ryan Wamsl...
EUROSEC
2009
ACM
14 years 2 months ago
Deep packet anonymization
Network traces of Internet attacks are among the most valuable resources for network analysts and security researchers. However, organizations and researchers are usually reluctan...
Michalis Foukarakis, Demetres Antoniades, Michalis...
SENSYS
2009
ACM
14 years 2 months ago
SensorTrust: a resilient trust model for WSNs
Guoxing Zhan, Weisong Shi, Julia Deng