Sciweavers

1351 search results - page 47 / 271
» Trust in Anonymity Networks
Sort
View
PET
2004
Springer
14 years 2 months ago
Synchronous Batching: From Cascades to Free Routes
The variety of possible anonymity network topologies has spurred much debate in recent years. In a synchronous batching design, each batch of messages enters the mix network togeth...
Roger Dingledine, Vitaly Shmatikov, Paul F. Syvers...
SCAM
2007
IEEE
14 years 3 months ago
Barrier Slicing for Remote Software Trusting
Remote trusting aims at verifying the “healthy” execution of a program running on an untrusted client that communicates with a trusted server via network connection. After giv...
Mariano Ceccato, Mila Dalla Preda, Jasvir Nagra, C...
IFIPTM
2009
171views Management» more  IFIPTM 2009»
13 years 6 months ago
Trust-Enhanced Recommender Systems for Efficient On-Line Collaboration
Trust has been explored by many researchers in the past as a solution for assisting the process of recommendation production. In this work we are examining the feasibility of build...
Georgios Pitsilis
COMPSAC
2006
IEEE
14 years 2 months ago
Application of Fuzzy Logic in Federated Trust Management for Pervasive Computing
In federated and pervasive networks, trust management has become a cornerstone for information security and privacy. Although people have recognized the importance of privacy and ...
Zhengping Wu, Alfred C. Weaver
ENTCS
2007
92views more  ENTCS 2007»
13 years 8 months ago
The MoR-Trust Distributed Trust Management System: Design and Simulation Results
MoR-Trust is a purely decentralized peer-to-peer trust management system, targeted towards networks and applications supporting transactions or collaborations of a quantitative na...
Stephanos Androutsellis-Theotokis, Diomidis Spinel...