Sciweavers

1351 search results - page 94 / 271
» Trust in Anonymity Networks
Sort
View
IEEEARES
2008
IEEE
14 years 3 months ago
Performance Analysis of Anonymous Communication Channels Provided by Tor
— Providing anonymity for end-users on the Internet is a very challenging and difficult task. There are currently only a few systems that are of practical relevance for the prov...
Andriy Panchenko, Lexi Pimenidis, Johannes Renner
SAC
2004
ACM
14 years 2 months ago
An anonymous bonus point system for mobile commerce based on word-of-mouth recommendation
Next generation mobile devices will allow users to share and pass information within anonymous groups of people in an ad hoc manner. This will smooth the path for many kinds of ne...
Tobias Straub, Andreas Heinemann
ICC
2011
IEEE
199views Communications» more  ICC 2011»
12 years 8 months ago
Equal-Sized Cells Mean Equal-Sized Packets in Tor?
Abstract—Tor is a well-known low-latency anonymous communication system. To prevent the traffic analysis attack, Tor packs application data into equal-sized cells. However, we f...
Zhen Ling, Junzhou Luo, Wei Yu, Xinwen Fu
PERCOM
2006
ACM
14 years 8 months ago
Composition Trust Bindings in Pervasive Computing Service Composition
In pervasive computing, devices or peers may implement or compose services using services from other devices or peers, and may use components from various sources. A composition t...
John Buford, Rakesh Kumar, Greg Perkins
ITRUST
2005
Springer
14 years 2 months ago
Alleviating the Sparsity Problem of Collaborative Filtering Using Trust Inferences
Collaborative Filtering (CF), the prevalent recommendation approach, has been successfully used to identify users that can be characterized as “similar” according to their logg...
Manos Papagelis, Dimitris Plexousakis, Themistokli...