Sciweavers

989 search results - page 99 / 198
» An information-based model for trust
Sort
View
CISIS
2009
IEEE
15 years 6 months ago
A Security Layer for JXTA Core Protocols
— JXTA defines a set of six core protocols specifically suited for ad hoc, pervasive, multi-hop, peer-to-peer (P2P) computing. These protocols allow peers to cooperate and form...
Joan Arnedo-Moreno, Jordi Herrera-Joancomart&iacut...
IPTPS
2004
Springer
15 years 4 months ago
DHT Routing Using Social Links
— The equality and anonymity of peer-to-peer networks makes them vulnerable to routing denial of service attacks from misbehaving nodes. In this paper, we investigate how existin...
Sergio Marti, Prasanna Ganesan, Hector Garcia-Moli...
TRUSTBUS
2004
Springer
15 years 4 months ago
Large-Scale Pay-As-You-Watch for Unicast and Multicast Communications
This paper addresses the problem of pay-as-you-watch services over unicast and multicast communications. For each communication model, we present two solutions, non-verifiable and...
Antoni Martínez-Ballesté, Francesc S...
ICISC
2003
115views Cryptology» more  ICISC 2003»
15 years 15 days ago
Receipt-Free Electronic Auction Schemes Using Homomorphic Encryption
Bid-rigging is a dangerous attack in electronic auction. Abe and Suzuki firstly introduced the idea of receipt-free to prevent this attack. In this paper we point out that Abe and...
Xiaofeng Chen, Byoungcheon Lee, Kwangjo Kim
IJSN
2006
116views more  IJSN 2006»
14 years 11 months ago
Secure collaborations over message boards
: We provide a message board model for collaborative systems, and propose an architecture and protocol for securing collaborative applications over message boards. The proposed arc...
Mahalingam Ramkumar, Nasir D. Memon