Sciweavers

Share
29 search results - page 1 / 6
» Certifying Trust
Sort
View
ATAL
2006
Springer
12 years 1 months ago
Certified reputation: how an agent can trust a stranger
Current computational trust models are usually built either on an agent's direct experience of an interaction partner (interaction trust) or reports provided by third parties...
Trung Dong Huynh, Nicholas R. Jennings, Nigel R. S...
FC
2009
Springer
84views Cryptology» more  FC 2009»
12 years 1 months ago
Private Intersection of Certified Sets
Abstract. This paper introduces certified sets to the private set intersection problem. A private set intersection protocol allows Alice and Bob to jointly compute the set intersec...
Jan Camenisch, Gregory M. Zaverucha
AINA
2007
IEEE
12 years 1 months ago
A Certified Email Protocol Using Key Chains
This paper introduces an asynchronous optimistic certified email protocol, with stateless recipients, that relies on key chains to considerably reduce the storage requirements of t...
Jan Cederquist, Muhammad Torabi Dashti, Sjouke Mau...
ENTCS
2007
171views more  ENTCS 2007»
11 years 9 months ago
A Certifying Code Generation Phase
Guaranteeing correctness of compilation is a vital precondition for correct software. Code generation can be one of the most error-prone tasks in a compiler. One way to achieve tr...
Jan Olaf Blech, Arnd Poetzsch-Heffter
WWW
2002
ACM
12 years 10 months ago
Certified email with a light on-line trusted third party: design and implementation
This paper presents a new protocol for certified email. The protocol aims to combine security, scalability, easy implementation, and viable deployment. The protocol relies on a li...
Martín Abadi, Neal Glew
books