Sciweavers

791 search results - page 121 / 159
» Users and Trust in Cyberspace
Sort
View
DBSEC
2006
134views Database» more  DBSEC 2006»
13 years 9 months ago
Notarized Federated Identity Management for Web Services
We propose a notarized federated identity management model that supports efficient user authentication when providers are unknown to each other. Our model introduces a notary servi...
Michael T. Goodrich, Roberto Tamassia, Danfeng Yao
AAAI
1996
13 years 9 months ago
Agent Amplified Communication
We propose an agent-based framework for assisting and simplifying person-to-person communication for information gathering tasks. As an example, we focus on locating experts for a...
Henry A. Kautz, Bart Selman, Al Milewski
DIMVA
2010
13 years 8 months ago
HProxy: Client-Side Detection of SSL Stripping Attacks
Abstract. In today's world wide web hundreds of thousands of companies use SSL to protect their customers' transactions from potential eavesdroppers. Recently, a new atta...
Nick Nikiforakis, Yves Younan, Wouter Joosen
HUC
2010
Springer
13 years 7 months ago
Toolkit to support intelligibility in context-aware applications
Context-aware applications should be intelligible so users can better understand how they work and improve their trust in them. However, providing intelligibility is nontrivial an...
Brian Y. Lim, Anind K. Dey
CONCURRENCY
2008
99views more  CONCURRENCY 2008»
13 years 7 months ago
TRIBLER: a social-based peer-to-peer system
Most current P2P file sharing systems treat their users as anonymous, unrelated entities, and completely disregard any social relationships between them. However, social phenomena...
Johan A. Pouwelse, Pawel Garbacki, Jun Wang, Arno ...