Sciweavers

791 search results - page 44 / 159
» Users and Trust in Cyberspace
Sort
View
ISW
2009
Springer
14 years 2 months ago
Adding Trust to P2P Distribution of Paid Content
While peer-to-peer (P2P) file-sharing is a powerful and cost-effective content distribution model, most paid-for digital-content providers (CPs) use direct download to deliver th...
Alex Sherman, Angelos Stavrou, Jason Nieh, Angelos...
ADBIS
2009
Springer
170views Database» more  ADBIS 2009»
14 years 2 months ago
Shall I Trust a Recommendation? Towards an Evaluation of the Trustworthiness of Recommender Sites
We present a preliminary study the aim of which is to provide a high level model for the evaluation of the trustworthiness of recommender systems as e-commerce services. We identif...
Gabriele Lenzini, Ynze van Houten, Wolf Huijsen, M...
ICCS
2004
Springer
14 years 1 months ago
Trusted Group Membership Service for JXTA
This paper presents Group Membership Service for JXTA extended with single or bi-directional authentication. The proposed solution exploits certificates and PKI (Public Key Infrast...
Lukasz Kawulok, Krzysztof Zielinski, Michal Jaesch...
EUROSYS
2008
ACM
14 years 4 months ago
Itrustpage: a user-assisted anti-phishing tool
Despite the many solutions proposed by industry and the research community to address phishing attacks, this problem continues to cause enormous damage. Because of our inability t...
Troy Ronda, Stefan Saroiu, Alec Wolman
WWW
2010
ACM
14 years 2 months ago
The anatomy of a large-scale social search engine
We present Aardvark, a social search engine. With Aardvark, users ask a question, either by instant message, email, web input, text message, or voice. Aardvark then routes the que...
Damon Horowitz, Sepandar D. Kamvar