Sciweavers

1351 search results - page 40 / 271
» Trust in Anonymity Networks
Sort
View
NCA
2006
IEEE
14 years 1 months ago
Trust Assessment from Observed Behavior: Toward and Essential Service for Trusted Network Computing
Modern distributed information systems handle increasingly critical data and computation, but there is no systematic way to assess whether a given part of the system can be entrus...
Partha Pratim Pal, Franklin Webber, Michael Atighe...
CACM
1999
138views more  CACM 1999»
13 years 7 months ago
Onion Routing
Onion Routing is an infrastructure for private communication over a public network. It provides anonymous connections that are strongly resistant to both eavesdropping and tra c a...
David M. Goldschlag, Michael G. Reed, Paul F. Syve...
IEICET
2010
154views more  IEICET 2010»
13 years 6 months ago
Trusted Routing Based on Dynamic Trust Mechanism in Mobile Ad-Hoc Networks
Sancheng Peng, Weijia Jia, Guojun Wang, Jie Wu, Mi...
ASIACRYPT
2001
Springer
13 years 11 months ago
Self-Blindable Credential Certificates from the Weil Pairing
Abstract. We describe two simple, efficient and effective credential pseudonymous certificate systems, which also support anonymity without the need for a trusted third party. The ...
Eric R. Verheul
CCS
2009
ACM
14 years 2 months ago
Scalable onion routing with torsk
We introduce Torsk, a structured peer-to-peer low-latency anonymity protocol. Torsk is designed as an interoperable replacement for the relay selection and directory service of th...
Jon McLachlan, Andrew Tran, Nicholas Hopper, Yongd...