Sciweavers

334 search results - page 20 / 67
» trust 2010
Sort
View
WISEC
2010
ACM
14 years 4 months ago
On the tradeoff between trust and privacy in wireless ad hoc networks
As privacy moves to the center of attention in networked systems, and the need for trust remains a necessity, an important question arises: How do we reconcile the two seemingly c...
Maxim Raya, Reza Shokri, Jean-Pierre Hubaux
JUCS
2010
98views more  JUCS 2010»
13 years 8 months ago
Toward an Understanding of the Mediating Role of "Trust" in Mobile Banking Service: An Empirical Test of Indonesia Case
: Mobile banking has been considered to be one of the most value-added and important mobile services currently available. Considering the fact that the penetration of this technolo...
Chulmo Koo, Yulia Wati
JUCS
2010
89views more  JUCS 2010»
13 years 8 months ago
Towards a Virtual Trusted Platform
: The advances and adoption of Trusted Computing and hardware assisted virtualisation technologies in standard PC platforms promise new approaches in building a robust virtualisati...
Martin Pirker, Ronald Toegl
TRUST
2010
Springer
14 years 2 months ago
Token-Based Cloud Computing
Secure outsourcing of computation to an untrusted (cloud) service provider is becoming more and more important. Pure cryptographic solutions based on fully homomorphic and verifia...
Ahmad-Reza Sadeghi, Thomas Schneider 0003, Marcel ...
ATAL
2010
Springer
13 years 11 months ago
Combining statistics and arguments to compute trust
We propose a method for constructing Dempster-Shafer belief functions modeling the trust of a given agent (the evaluator) in another (the target) by combining statistical informat...
Paul-Amaury Matt, Maxime Morge, Francesca Toni