Sciweavers

177 search results - page 2 / 36
» Trusted Computing, Trusted Third Parties, and Verified Commu...
Sort
View
PRICAI
1999
Springer
13 years 12 months ago
Making Rational Decisions in N-by-N Negotiation Games with a Trusted Third Party
The optimal decision for an agent to make at a given game situation often depends on the decisions that other agents make at the same time. Rational agents will try to find a stabl...
Shih-Hung Wu, Von-Wun Soo
ISW
2001
Springer
14 years 1 days ago
An Optimistic Non-repudiation Protocol with Transparent Trusted Third Party
Abstract. In this paper we consider a new and efficient optimistic nonrepudiation protocol. In a non-repudiation protocol, during which Alice wants to transmit a message to Bob, Al...
Olivier Markowitch, Steve Kremer
ACSC
2006
IEEE
14 years 1 months ago
Trust network analysis with subjective logic
Trust networks consist of transitive trust relationships between people, organisations and software agents connected through a medium for communication and interaction. By formali...
Audun Jøsang, Ross Hayward, Simon Pope
EUROCRYPT
2003
Springer
14 years 25 days ago
Fair Secure Two-Party Computation
Abstract Benny Pinkas HP Labs Abstract. We demonstrate a transformation of Yao’s protocol for secure two-party computation to a fair protocol in which neither party gains any sub...
Benny Pinkas
FC
2001
Springer
123views Cryptology» more  FC 2001»
14 years 3 days ago
Optimistic Fair Exchange with Transparent Signature Recovery
In this paper, we propose a new practical fair exchange protocol allowing the exchange of an electronic item against a signature. The protocol is based on the Guillou-Quisquater s...
Olivier Markowitch, Shahrokh Saeednia