Sciweavers

26 search results - page 3 / 6
» ijisec 2006
Sort
View
IJISEC
2007
63views more  IJISEC 2007»
13 years 4 months ago
A familiarity-based trust model for effective selection of sellers in multiagent e-commerce systems
In electronic marketplaces, trust is modeled, for instance, in order to allow buying agents to make effective selection of selling agents. Familiarity is often considered to be an ...
Jie Zhang, Ali A. Ghorbani, Robin Cohen
IJISEC
2007
66views more  IJISEC 2007»
13 years 4 months ago
Protecting data privacy through hard-to-reverse negative databases
The paper extends the idea of negative representations of information for enhancing privacy. Simply put, a set DB of data elements can be represented in terms of its complement set...
Fernando Esponda, Elena S. Ackley, Paul Helman, Ha...
IJISEC
2002
86views more  IJISEC 2002»
13 years 4 months ago
Using AVL trees for fault-tolerant group key management
In this paper we describe an efficient algorithm for the management of group-keys for Group Communication Systems. Our algorithm is based on the notion of key-graphs, previously u...
Ohad Rodeh, Kenneth P. Birman, Danny Dolev
IJISEC
2002
52views more  IJISEC 2002»
13 years 4 months ago
Securing SOAP e-services
Remote service invocation via HTTP and XML promises to become an important component of the Internet infrastructure. Work is ongoing in the W3C XML Protocol Working Group to define...
Ernesto Damiani, Sabrina De Capitani di Vimercati,...
IJISEC
2010
121views more  IJISEC 2010»
13 years 3 months ago
Flowchart description of security primitives for controlled physical unclonable functions
Physical Unclonable Functions (PUFs) are physical objects that are unique, practically unclonable and that behave like a random function when subjected to a challenge. Their use h...
Boris Skoric, Marc X. Makkes