Sciweavers

63 search results - page 13 / 13
» Vulnerabilities in Anonymous Credential Systems
Sort
View
SEMWEB
2004
Springer
13 years 11 months ago
Personalized Reputation Management in P2P Networks
P2P networks have become increasingly popular in the recent years. However, their open, distributed and anonymous nature makes them very vulnerable against malicious users who prov...
Paul-Alexandru Chirita, Wolfgang Nejdl, Mario T. S...
CCS
2010
ACM
13 years 5 months ago
Detecting and characterizing social spam campaigns
Online social networks (OSNs) are popular collaboration and communication tools for millions of users and their friends. Unfortunately, in the wrong hands, they are also effective...
Hongyu Gao, Jun Hu, Christo Wilson, Zhichun Li, Ya...
ATAL
2008
Springer
13 years 7 months ago
Anonymity-proof Shapley value: extending shapley value for coalitional games in open environments
Coalition formation is an important capability for automated negotiation among self-interested agents. In order for coalitions to be stable, a key question that must be answered i...
Naoki Ohta, Vincent Conitzer, Yasufumi Satoh, Atsu...