Sciweavers

989 search results - page 162 / 198
» An information-based model for trust
Sort
View
67
Voted
DSN
2009
IEEE
15 years 5 months ago
Fail-Aware Untrusted Storage
We consider a set of clients collaborating through an online service provider that is subject to attacks, and hence y trusted by the clients. We introduce the abstraction of a fai...
Christian Cachin, Idit Keidar, Alexander Shraer
CRYPTO
2009
Springer
105views Cryptology» more  CRYPTO 2009»
15 years 5 months ago
Privacy-Enhancing Auctions Using Rational Cryptography
Abstract. We consider enhancing with privacy concerns a large class of auctions, which include sealed-bid single-item auctions but also general multi-item multi-winner auctions, ou...
Peter Bro Miltersen, Jesper Buus Nielsen, Nikos Tr...
82
Voted
FC
2009
Springer
100views Cryptology» more  FC 2009»
15 years 5 months ago
Expecting the Unexpected: Towards Robust Credential Infrastructure
Cryptographic credential infrastructures, such as Public key infrastructure (PKI), allow the building of trust relationships in electronic society and electronic commerce. At the c...
Shouhuai Xu, Moti Yung
HICSS
2008
IEEE
124views Biometrics» more  HICSS 2008»
15 years 5 months ago
Measuring Factors that Influence the Success of E-Government Initiatives
Understanding how citizens value e-government services is critical to the success of these initiatives. This paper describes the development of a model to identify factors that in...
Ronnie Park
HOST
2008
IEEE
15 years 5 months ago
Hardware Trojan Detection Using Path Delay Fingerprint
—Trusted IC design is a recently emerged topic since fabrication factories are moving worldwide in order to reduce cost. In order to get a low-cost but effective hardware Trojan ...
Yier Jin, Yiorgos Makris