Sciweavers

4142 search results - page 119 / 829
» Trusting an Information Agent
Sort
View
128
Voted
DAC
2007
ACM
15 years 7 months ago
Trusted Design in FPGAs
Using FPGAs, a designer can separate the design process from the manufacturing flow. Therefore, the owner of a sensitive design need not expose the design to possible theft and ta...
Steven Trimberger
119
Voted
ICONIP
2009
15 years 1 months ago
Comparing a Cognitive and a Neural Model for Relative Trust Dynamics
Trust dynamics can be modelled in relation to experiences. Both cognitive and neural models for trust dynamics in relation to experiences are available, but were not yet related or...
S. Waqar Jaffry, Jan Treur
124
Voted
IEEEIAS
2008
IEEE
15 years 10 months ago
Geolocation-Based Trust for Vanet's Privacy
: Research in Vehicular Ad Hoc NETworks (VANETs) has evolved considerably over the last years. Security and privacy in VANETs have recently appealed special interest in the researc...
Jetzabel Serna, Jesus Luna, Manel Medina
128
Voted
CAISE
2007
Springer
15 years 10 months ago
Achieving trust in IT outsourcing relationships
IT outsourcing is a viable option for organizations to maintain competitiveness and get the ability to focus on core competences. However, there are risks, such as handing over sen...
Eva Söderström, Christian Lennerholt
123
Voted
SIGCPR
2006
ACM
346views Hardware» more  SIGCPR 2006»
15 years 9 months ago
An extension of the UTAUT model with e-quality, trust, and satisfaction constructs
This research seeks to validate a comprehensive model of quality in the context of e-business systems. It also extends the UTAUT model with e-quality, trust, and satisfaction cons...
Erin Cody-Allen, Rajiv Kishore