Sciweavers

1120 search results - page 104 / 224
» Trust in Electronic Environments
Sort
View
ICICS
2005
Springer
14 years 3 months ago
Remotely Keyed Cryptographics Secure Remote Display Access Using (Mostly) Untrusted Hardware
Software that covertly monitors a user’s actions, also known as spyware, has become a first-level security threat due to its ubiquity and the difficulty of detecting and remov...
Debra L. Cook, Ricardo A. Baratto, Angelos D. Kero...
NCA
2009
IEEE
14 years 5 months ago
Sharing Private Information Across Distributed Databases
—In industries such as healthcare, there is a need to electronically share privacy-sensitive data across distinct organizations. We show how this can be done while allowing organ...
Michael Siegenthaler, Ken Birman
GLOBECOM
2006
IEEE
14 years 4 months ago
Bank Transfer over Quantum Channel with Digital Checks
- In recent years, many quantum cryptographic schemes have been proposed. However, it seems that there are many technical difficulties to realize them (except Quantum Key Distribut...
Yoshito Kanamori, Seong-Moo Yoo, Frederick T. Shel...
CIA
2004
Springer
14 years 3 months ago
Collaboration Analysis in Recommender Systems Using Social Networks
Abstract. Many researchers have focused their efforts on developing collaborative recommender systems. It has been proved that the use of collaboration in such systems improves per...
Jordi Palau, Miquel Montaner, Beatriz López...
SIGECOM
2000
ACM
121views ECommerce» more  SIGECOM 2000»
14 years 2 months ago
Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior
Reputation reporting systems have emerged as an important risk management mechanism in online trading communities. However, the predictive value of these systems can be compromise...
Chrysanthos Dellarocas