Sciweavers

1351 search results - page 59 / 271
» Trust in Anonymity Networks
Sort
View
JCP
2008
206views more  JCP 2008»
13 years 8 months ago
SW-R2P: A Trusted Small World Overlay P2P Network with Zero Knowledge Identification
In order to implement both the efficiency and security in the Peer-to-Peer (P2P) network, we design a trusted small world overlay P2P network with the role based and reputation bas...
Yingjie Xia, Guanghua Song, Yao Zheng
ATAL
2006
Springer
14 years 17 days ago
Learning trust strategies in reputation exchange networks
An agent's trust decision strategy consists of the agent's policies for making trust-related decisions, such as who to trust, how trustworthy to be, what reputations to ...
Karen Fullam, K. Suzanne Barber
CSE
2009
IEEE
14 years 3 months ago
Security and Trust through Electronic Social Network-Based Interactions
—The success of a Public Key Infrastructure such as the Web of Trust (WoT) heavily depends on its ability to ensure that public keys are used by their legitimate owners, thereby ...
Patrik Bichsel, Samuel Müller, Franz-Stefan P...
WDAG
2001
Springer
76views Algorithms» more  WDAG 2001»
14 years 1 months ago
An Effective Characterization of Computability in Anonymous Networks
We provide effective (i.e., recursive) characterizations of the relations that can be computed on networks where all processors use the same algorithm, start from the same state, a...
Paolo Boldi, Sebastiano Vigna
CCS
2009
ACM
14 years 9 months ago
The union-split algorithm and cluster-based anonymization of social networks
Knowledge discovery on social network data can uncover latent social trends and produce valuable findings that benefit the welfare of the general public. A growing amount of resea...
Brian Thompson, Danfeng Yao