Sciweavers

3638 search results - page 1 / 728
» Distribution chain security
Sort
View
CCS
2001
ACM
13 years 9 months ago
Distributed credential chain discovery in trust management: extended abstract
Ninghui Li, William H. Winsborough, John C. Mitche...
CCS
2000
ACM
13 years 9 months ago
Distribution chain security
Ø Ð ÓÒØ ÒØ ×ØÖ ÙØ ÓÒ ×Ý×Ø Ñ× Û ÐÐ Ò Ð Ù× Ò ×× ÑÓ ¹ Ð× Ò Ø Ò Ö ÙØÙÖ Ø Ø ÒÒÓØ ÔÖ Ø ØÓ Ýº ÁÒ Ø × Ô Ô Ö¸ Û ÒØ Ý Ò ...
Glenn Durfee, Matthew K. Franklin
TKDE
2010
272views more  TKDE 2010»
13 years 3 months ago
P2P Reputation Management Using Distributed Identities and Decentralized Recommendation Chains
—Peer-to-peer (P2P) networks are vulnerable to peers who cheat, propagate malicious code, leech on the network, or simply do not cooperate. The traditional security techniques de...
Prashant Dewan, Partha Dasgupta
SRDS
2003
IEEE
13 years 10 months ago
Federation Web: A Scheme to Compound Authorization Chains on Large-Scale Distributed Systems
Traditional security systems are not easily scalable and can become single points of failure or performance bottlenecks when used on a large-scale distributed system such as the I...
Altair Olivo Santin, Joni da Silva Fraga, Frank Si...
ICDCSW
2003
IEEE
13 years 10 months ago
Foundations of Security for Hash Chains in Ad Hoc Networks
Nodes in ad hoc networks generally transmit data at regular intervals over long periods of time. Recently, ad hoc network nodes have been built that run on little power and have v...
Phillip G. Bradford, Olga V. Gavrylyako