Sciweavers

1229 search results - page 61 / 246
» Trusted Computing
Sort
View
P2P
2003
IEEE
101views Communications» more  P2P 2003»
14 years 2 months ago
Trust and Reputation Model in Peer-to-Peer Networks
Yao Wang, Julita Vassileva
WISEC
2010
ACM
14 years 4 months ago
On the tradeoff between trust and privacy in wireless ad hoc networks
As privacy moves to the center of attention in networked systems, and the need for trust remains a necessity, an important question arises: How do we reconcile the two seemingly c...
Maxim Raya, Reza Shokri, Jean-Pierre Hubaux
ETRICS
2006
14 years 19 days ago
Visual Document Authentication Using Human-Recognizable Watermarks
Digital signatures and message authentication codes are well known methods for ensuring message integrity. However, they rely on computations which are too hard to be performed by ...
Igor Fischer, Thorsten Herfet
ATC
2006
Springer
13 years 11 months ago
Managing Trust in Distributed Agent Systems
Abstract. Software agent technology has attracted much attention for developing various distributed systems, composed of autonomous agents interacting with one another using partic...
Stephen S. Yau
OTM
2007
Springer
14 years 3 months ago
Fine Grained Access Control with Trust and Reputation Management for Globus
Abstract. We propose an integrated architecture, extending a framework for fine grained access control of Grid computational services, with an inference engine managing reputation...
Maurizio Colombo, Fabio Martinelli, Paolo Mori, Ma...