Sciweavers

1351 search results - page 43 / 271
» Trust in Anonymity Networks
Sort
View
ATAL
2009
Springer
14 years 2 months ago
Operators for propagating trust and their evaluation in social networks
Trust is a crucial basis for interactions among parties in large, open systems. Yet, the scale and dynamism of such systems make it infeasible for each party to have a direct basi...
Chung-Wei Hang, Yonghong Wang, Munindar P. Singh
NDSS
2007
IEEE
14 years 1 months ago
Playing Devil's Advocate: Inferring Sensitive Information from Anonymized Network Traces
Encouraging the release of network data is central to promoting sound network research practices, though the publication of this data can leak sensitive information about the publ...
Scott E. Coull, Charles V. Wright, Fabian Monrose,...
SP
2009
IEEE
144views Security Privacy» more  SP 2009»
14 years 2 months ago
De-anonymizing Social Networks
Operators of online social networks are increasingly sharing potentially sensitive information about users and their relationships with advertisers, application developers, and da...
Arvind Narayanan, Vitaly Shmatikov
ICDCS
2005
IEEE
14 years 1 months ago
Scalable, Server-Passive, User-Anonymous Timed Release Cryptography
We consider the problem of sending messages into the future, commonly known as timed release cryptography. Existing schemes for this task either solve the relative time problem wi...
Aldar C.-F. Chan, Ian F. Blake
SEMWEB
2007
Springer
14 years 1 months ago
Recommendation Privacy Protection in Trust-based Knowledge Sharing Network
Trust can be applied to knowledge sharing on a distributed network of knowledge source agents. Each agent represents a person who trusts some other agents. Based on these trust-rel...
Weisen Guo, Steven B. Kraines