Emerging peer-to-peer services such as Freenet, Gnutella, Kazaa, and Napster provide an easy and efficient way to share resources and information. However, misuse or unfair exploit...
Hoh Peter In, Konstantinos A. Meintanis, Ming Zhan...
The problem of encouraging trustworthy behavior in P2P online communities by managing peers’ reputations has drawn a lot of attention recently. However, most of the proposed solu...
Chameleon signatures are non-interactive signatures based on a hash-and-sign paradigm, and similar in efficiency to regular signatures. The distinguishing characteristic of chamel...
Popular mobile code architectures (Java and .NET) include verifiers to check for memory safety and other security properties. Since their formats are relatively high level, suppor...
In multilaterally secure intrusion detection systems (IDS) anonymity and accountability are potentially conflicting requirements. Since IDS rely on audit data to detect violations...