Sciweavers

1351 search results - page 73 / 271
» Trust in Anonymity Networks
Sort
View
WISTP
2010
Springer
14 years 3 months ago
Trust in Peer-to-Peer Content Distribution Protocols
Abstract. The distribution of virtual goods like multimedia data relies on the trustworthiness of the distribution system. Recent concepts for the distribution based on peer to pee...
Nicolai Kuntze, Carsten Rudolph, Andreas Fuchs
POLICY
2007
Springer
14 years 3 months ago
On Interoperable Trust Negotiation Strategies
Among the many works on trust negotiation, only a few deal with negotiation strategies. These works are tailored to specific frameworks—so their results cannot be extended to c...
Sabrina Baselice, Piero A. Bonatti, Marco Faella
WECWIS
2005
IEEE
87views ECommerce» more  WECWIS 2005»
14 years 2 months ago
TrustDavis: A Non-Exploitable Online Reputation System
We present TrustDavis, an online reputation system that provides insurance against trade fraud by leveraging existing relationships between players, such as the ones present in so...
Dimitri do B. DeFigueiredo, Earl T. Barr
INFOCOM
2008
IEEE
14 years 3 months ago
A Practical and Flexible Key Management Mechanism For Trusted Collaborative Computing
—Trusted Collaborative Computing (TCC) is a new research and application paradigm. Two important challenges in such a context are represented by secure information transmission a...
Xukai Zou, Yuan-Shun Dai, Elisa Bertino
MINENET
2006
ACM
14 years 2 months ago
SC2D: an alternative to trace anonymization
Progress in networking research depends crucially on applying novel analysis tools to real-world traces of network activity. This often conflicts with privacy and security requir...
Jeffrey C. Mogul, Martin F. Arlitt