Sciweavers

8655 search results - page 8 / 1731
» Trusted computing challenges
Sort
View
ITIIS
2010
150views more  ITIIS 2010»
13 years 6 months ago
Computational Trust and Its Impact over Rational Purchasing Decisions of Internet Users
As web-based online communities are rapidly growing, the agents in the communities need to know their measurable belief of trust for safe and successful interactions. In this pape...
Sanguk Noh
CRYPTO
2003
Springer
132views Cryptology» more  CRYPTO 2003»
14 years 21 days ago
On Cryptographic Assumptions and Challenges
We deal with computational assumptions needed in order to design secure cryptographic schemes. We suggest a classi£cation of such assumptions based on the complexity of falsifying...
Moni Naor
WAC
2005
Springer
122views Communications» more  WAC 2005»
14 years 29 days ago
Trust Management Issues for Ad Hoc and Self-organized Networks
Self-organized and ad hoc communications have many fundamental principles in common and also face similar problems in the domains of security and Quality of Service. Trust manageme...
Vassileios Tsetsos, Giannis F. Marias, Sarantis Pa...
CCS
2010
ACM
13 years 5 months ago
Assessing trust in uncertain information using Bayesian description logic
Decision makers (humans or software agents alike) are faced with the challenge of examining large volumes of information originating from heterogeneous sources with the goal of as...
Achille Fokoue, Mudhakar Srivatsa, Robert Young
ICECCS
2005
IEEE
154views Hardware» more  ICECCS 2005»
14 years 1 months ago
Customizable Framework for Managing Trusted Components Deployed on Middleware
Due to the widespread trust threat under the open and dynamic Internet environment, the computer community has endeavored to engage in the studies of technologies for protecting a...
Minghui Zhou, Wenpin Jiao, Hong Mei