Sciweavers

1229 search results - page 49 / 246
» Trusted Computing
Sort
View
CSE
2008
IEEE
14 years 2 months ago
A Trust Model Applied to E-mail Servers
E-mail services are essential in the Internet. However, the basic e-mail architecture presents problems that opens it to several threats. Alternatives have been proposed to solve ...
Leonardo de Oliveira, Carlos Maziero
FC
2006
Springer
108views Cryptology» more  FC 2006»
13 years 11 months ago
Uncheatable Reputation for Distributed Computation Markets
Reputation systems aggregate mutual feedback of interacting peers into a "reputation" metric for each participant. This is then available to prospective service "req...
Bogdan Carbunar, Radu Sion
CSE
2009
IEEE
14 years 2 months ago
Trust Is in the Eye of the Beholder
We carefully investigate humanity’s intuitive understanding of trust and extract from it fundamental properties that succinctly synthesize how trust works. From this detailed ch...
Dimitri do B. DeFigueiredo, Earl T. Barr, Shyhtsun...
COOPIS
2004
IEEE
13 years 11 months ago
Trust-Aware Collaborative Filtering for Recommender Systems
Recommender Systems allow people to find the resources they need by making use of the experiences and opinions of their nearest neighbours. Costly annotations by experts are replac...
Paolo Massa, Paolo Avesani
ACSC
2004
IEEE
13 years 11 months ago
Establishing Trust In Pure Ad-hoc Networks
An ad-hoc network of wireless nodes is a temporarily formed network, created, operated and managed by the nodes themselves. It is also often termed an infrastructure-less, self-or...
Asad Amir Pirzada, Chris McDonald