Sciweavers

555 search results - page 10 / 111
» Anonymous Webs of Trust
Sort
View
EPEW
2008
Springer
14 years 11 months ago
Evaluation of P2P Algorithms for Probabilistic Trust Inference in a Web of Trust
The problem of finding trust paths and estimating the trust one can place in a partner arises in various application areas, including virtual organisations, authentication systems ...
Huqiu Zhang, Aad P. A. van Moorsel
NDSS
2008
IEEE
15 years 4 months ago
Taming the Devil: Techniques for Evaluating Anonymized Network Data
Anonymization plays a key role in enabling the public release of network datasets, and yet there are few, if any, techniques for evaluating the efficacy of network data anonymiza...
Scott E. Coull, Charles V. Wright, Angelos D. Kero...
CARDIS
2008
Springer
113views Hardware» more  CARDIS 2008»
14 years 11 months ago
The Trusted Execution Module: Commodity General-Purpose Trusted Computing
This paper introduces the Trusted Execution Module (TEM); a high-level specification for a commodity chip that can execute usersupplied procedures in a trusted environment. The TEM...
Victor Costan, Luis F. G. Sarmenta, Marten van Dij...
CCS
2004
ACM
15 years 3 months ago
Direct anonymous attestation
This paper describes the direct anonymous attestation scheme (DAA). This scheme was adopted by the Trusted Computing Group as the method for remote authentication of a hardware mo...
Ernest F. Brickell, Jan Camenisch, Liqun Chen
IH
1999
Springer
15 years 1 months ago
The Cocaine Auction Protocol: On the Power of Anonymous Broadcast
Abstract. Traditionally, cryptographic protocols are described as a sequence of steps, in each of which one principal sends a message to another. It is assumed that the fundamental...
Frank Stajano, Ross J. Anderson