Sciweavers

1351 search results - page 50 / 271
» Trust in Anonymity Networks
Sort
View
ICCCN
2008
IEEE
14 years 3 months ago
A Trust Model Robust to Slander Attacks in Ad Hoc Networks
— Slander attacks represent a significant danger to distributed reputation systems. Malicious nodes may collude to lie about the reputation of a particular neighbor and cause se...
Pedro B. Velloso, Rafael P. Laufer, Otto Carlos Mu...
AINA
2006
IEEE
14 years 2 months ago
Autonomic Trust Prediction for Pervasive Systems
Pervasive computing is becoming a reality, thanks to advances in wireless networking and increased popularity of portable devices. Users of these devices will need support to deci...
Licia Capra, Mirco Musolesi
DMSN
2010
ACM
13 years 9 months ago
Provenance-based trustworthiness assessment in sensor networks
As sensor networks are being increasingly deployed in decisionmaking infrastructures such as battlefield monitoring systems and SCADA(Supervisory Control and Data Acquisition) sys...
Hyo-Sang Lim, Yang-Sae Moon, Elisa Bertino
PVLDB
2008
146views more  PVLDB 2008»
13 years 8 months ago
Resisting structural re-identification in anonymized social networks
We identify privacy risks associated with releasing network data sets and provide an algorithm that mitigates those risks. A network consists of entities connected by links repres...
Michael Hay, Gerome Miklau, David Jensen, Donald F...
PET
2007
Springer
14 years 2 months ago
Nymble: Anonymous IP-Address Blocking
Abstract. Anonymizing networks such as Tor allow users to access Internet services privately using a series of routers to hide the client’s IP address from the server. Tor’s su...
Peter C. Johnson, Apu Kapadia, Patrick P. Tsang, S...