Sciweavers

1351 search results - page 93 / 271
» Trust in Anonymity Networks
Sort
View
WASA
2009
Springer
186views Algorithms» more  WASA 2009»
14 years 1 months ago
Utopia Providing Trusted Social Network Relationships within an Un-trusted Environment
Abstract. This paper introduces an unobtrusive method and distributed solution set to aid users of on-line social networking sites, by creating a trusted environment in which every...
William Gauvin, Benyuan Liu, Xinwen Fu, Jie Wang
IJNSEC
2011
272views more  IJNSEC 2011»
13 years 3 months ago
Trust Key Management Scheme for Wireless Body Area Networks
With recent advances in wireless sensor networks and embedded computing technologies, miniaturized pervasive health monitoring devices have become practically feasible. In additio...
Mohammed Mana, Mohammed Feham, Boucif Amar Bensabe...
EDBT
2008
ACM
149views Database» more  EDBT 2008»
14 years 9 months ago
A probabilistic trust model for semantic peer to peer systems
Semantic peer to peer (P2P) systems are fully decentralized overlay networks of people or machines (called peers) sharing and searching varied resources (documents, videos, photos...
Gia Hien Nguyen, Philippe Chatalic, Marie-Christin...
PROCEDIA
2010
153views more  PROCEDIA 2010»
13 years 7 months ago
Conceptual framework for dynamic trust monitoring and prediction
The dynamic and collaborative nature of mobile and sensor networks raises the issue of how connected mobile devices can be trusted. Despite the existing security paradigms such as...
Olufunmilola Onolaja, Rami Bahsoon, Georgios Theod...
EUROPKI
2004
Springer
14 years 2 months ago
Distributing Security-Mediated PKI
The security-mediated approach to PKI offers several advantages, such as instant revocation and compatibility with standard RSA tools. In this paper, we present a design and protot...
Gabriel Vanrenen, Sean W. Smith