Sciweavers

791 search results - page 76 / 159
» Users and Trust in Cyberspace
Sort
View
ESORICS
2008
Springer
13 years 9 months ago
CROO: A Universal Infrastructure and Protocol to Detect Identity Fraud
Abstract. Identity fraud (IDF) may be defined as unauthorized exploitation of credential information through the use of false identity. We propose CROO, a universal (i.e. generic) ...
D. Nali, Paul C. van Oorschot
P2P
2008
IEEE
14 years 2 months ago
Transaction Rate Limiters for Peer-to-Peer Systems
We introduce transaction rate limiters, new mechanisms that limit (probabilistically) the maximum number of transactions a user of a peer-to-peer system can do in any given period...
Marcos Kawazoe Aguilera, Mark Lillibridge, Xiaozho...
MDAI
2007
Springer
14 years 1 months ago
A Public-Key Protocol for Social Networks with Private Relationships
Abstract. The need for protecting the privacy of relationships in social networks has recently been stressed in the literature. Conventional protection mechanisms in those networks...
Josep Domingo-Ferrer
INFOCOM
2003
IEEE
14 years 1 months ago
Cooperative Peer Groups in NICE
Abstract— We present a distributed scheme for trust inference in peer-to-peer networks. Our work is in context of the NICE system, which is a platform for implementing cooperativ...
Seungjoon Lee, Rob Sherwood, Samrat Bhattacharjee
ITCC
2003
IEEE
14 years 1 months ago
A Federated Model for Secure Web-Based Videoconferencing
This paper describes efforts underway within Internet2 to create a secure federated IP based videoconferencing model. The objective is to create an environment that is user-friend...
Douglas C. Sicker, Ameet Kulkarni, Anand Chavali, ...