Alice first meets Bob in an entertainment shop, then, they wish to share multimedia content, but Do they know what are trustworthy users? How do they share such information in a s...
In this paper, we propose a new practical fair exchange protocol allowing the exchange of an electronic item against a signature. The protocol is based on the Guillou-Quisquater s...
Software agent marketplaces require the development of new architectures, which are capable of coping with unreliable computational and network infrastructures, limited trust amon...
Chrysanthos Dellarocas, Mark Klein, Juan A. Rodr&i...
: Internet based business leads to new challenges for Information Security with trust building and partner protection as the most important issues. This article gives an overview o...
Modern distributed information systems handle increasingly critical data and computation, but there is no systematic way to assess whether a given part of the system can be entrus...
Partha Pratim Pal, Franklin Webber, Michael Atighe...