Sciweavers

163 search results - page 11 / 33
» What Instills Trust
Sort
View
JOC
2000
95views more  JOC 2000»
13 years 7 months ago
Player Simulation and General Adversary Structures in Perfect Multiparty Computation
The goal of secure multiparty computation is to transform a given protocol involving a trusted party into a protocol without need for the trusted party, by simulating the party am...
Martin Hirt, Ueli M. Maurer
CHI
2005
ACM
14 years 7 months ago
Building security and trust in online banking
Growing threats to online banking security (e.g. phishing, personal identify fraud) and the personal nature of the data make the balance between security, trust and usability vita...
Maria Nilsson, Anne Adams, Simon Herd
ATAL
2005
Springer
14 years 28 days ago
Trust evaluation through relationship analysis
Current mechanisms for evaluating the trustworthiness of an agent within an electronic marketplace depend either on using a history of interactions or on recommendations from othe...
Ronald Ashri, Sarvapali D. Ramchurn, Jordi Sabater...
HICSS
1997
IEEE
122views Biometrics» more  HICSS 1997»
13 years 11 months ago
Developing Trust in Virtual Teams
A research project with distributed electronic teams was conducted to examine how virtual temporary teams quickly develop and maintain trust relationships with people that they ha...
Suzanne Iacono, Suzanne P. Weisband
USS
2004
13 years 8 months ago
Design of the EROS Trusted Window System
Window systems are the primary mediator of user input and output in modern computing systems. They are also a commonly used interprocess communication mechanism. As a result, they...
Jonathan S. Shapiro, John Vanderburgh, Eric Northu...