Sciweavers

555 search results - page 71 / 111
» Anonymous Webs of Trust
Sort
View
ICISC
2004
146views Cryptology» more  ICISC 2004»
14 years 11 months ago
Identity Based Threshold Ring Signature
In threshold ring signature schemes, any group of t entities spontaneously conscript arbitrarily n - t entities to generate a publicly verifiable t-out-of-n signature on behalf of ...
Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming ...
CONCURRENCY
2008
99views more  CONCURRENCY 2008»
14 years 9 months ago
TRIBLER: a social-based peer-to-peer system
Most current P2P file sharing systems treat their users as anonymous, unrelated entities, and completely disregard any social relationships between them. However, social phenomena...
Johan A. Pouwelse, Pawel Garbacki, Jun Wang, Arno ...
IWC
2007
106views more  IWC 2007»
14 years 9 months ago
The role of social presence in establishing loyalty in e-Service environments
Compared to offline shopping, the online shopping experience may be viewed as lacking human warmth and sociability as it is more impersonal, anonymous, automated and generally dev...
Dianne Cyr, Khaled Hassanein, Milena M. Head, Alex...
CISC
2009
Springer
148views Cryptology» more  CISC 2009»
14 years 7 months ago
A DAA Scheme Requiring Less TPM Resources
Abstract. Direct anonymous attestation (DAA) is a special digital signature primitive, which provides a balance between signer authentication and privacy. One of the most interesti...
Liqun Chen
IHI
2010
124views Healthcare» more  IHI 2010»
14 years 4 months ago
Reliable medical recommendation systems with patient privacy
One of the concerns patients have when confronted with a medical condition is which physician to trust. Any recommendation system that seeks to answer this question must ensure an...
T. Ryan Hoens, Marina Blanton, Nitesh V. Chawla