Sciweavers

989 search results - page 137 / 198
» An information-based model for trust
Sort
View
ADVIS
2004
Springer
15 years 4 months ago
Kaliphimos: A Community-Based Peer-to-Peer Group Management Scheme
Emerging peer-to-peer services such as Freenet, Gnutella, Kazaa, and Napster provide an easy and efficient way to share resources and information. However, misuse or unfair exploit...
Hoh Peter In, Konstantinos A. Meintanis, Ming Zhan...
CIA
2004
Springer
15 years 4 months ago
A Probabilistic Approach to Predict Peers? Performance in P2P Networks
The problem of encouraging trustworthy behavior in P2P online communities by managing peers’ reputations has drawn a lot of attention recently. However, most of the proposed solu...
Zoran Despotovic, Karl Aberer
FC
2004
Springer
120views Cryptology» more  FC 2004»
15 years 4 months ago
Identity-Based Chameleon Hash and Applications
Chameleon signatures are non-interactive signatures based on a hash-and-sign paradigm, and similar in efficiency to regular signatures. The distinguishing characteristic of chamel...
Giuseppe Ateniese, Breno de Medeiros
97
Voted
CC
2003
Springer
102views System Software» more  CC 2003»
15 years 4 months ago
Precision in Practice: A Type-Preserving Java Compiler
Popular mobile code architectures (Java and .NET) include verifiers to check for memory safety and other security properties. Since their formats are relatively high level, suppor...
Christopher League, Zhong Shao, Valery Trifonov
DIAU
2000
Springer
15 years 3 months ago
On Pseudonymization of Audit Data for Intrusion Detection
In multilaterally secure intrusion detection systems (IDS) anonymity and accountability are potentially conflicting requirements. Since IDS rely on audit data to detect violations...
Joachim Biskup, Ulrich Flegel