Sciweavers

947 search results - page 75 / 190
» HMM-Based Trust Model
Sort
View
109
Voted
AINA
2007
IEEE
15 years 7 months ago
Trust Enhanced Secure Mobile Ad-Hoc Network Routing
In recent years, several trust and reputation models have been proposed to enhance the security of mobile ad hoc networks. However, they either fail to capture evidence of trustwo...
Venkatesan Balakrishnan, Vijay Varadharajan, Phill...
86
Voted
ATAL
2005
Springer
15 years 6 months ago
Trust evaluation through relationship analysis
Current mechanisms for evaluating the trustworthiness of an agent within an electronic marketplace depend either on using a history of interactions or on recommendations from othe...
Ronald Ashri, Sarvapali D. Ramchurn, Jordi Sabater...
103
Voted
WIAS
2008
98views more  WIAS 2008»
15 years 19 days ago
Delegations guided by trust and autonomy
This paper explores delegation decisions predicated on models of trust and autonomy among agents. In socially rich environments, trust and autonomy of artificial agents are key att...
Henry Hexmoor, Shahram Rahimi, Rachil Chandran
ATC
2007
Springer
15 years 7 months ago
Malicious Participants in Group Key Exchange: Key Control and Contributiveness in the Shadow of Trust
Group key exchange protocols allow their participants to compute a secret key which can be used to ensure security and privacy for various multi-party applications. The resulting g...
Emmanuel Bresson, Mark Manulis
116
Voted
SSS
2007
Springer
130views Control Systems» more  SSS 2007»
15 years 6 months ago
Secure Failure Detection in TrustedPals
We present a modular redesign of TrustedPals, a smartcard-based security framework for solving secure multiparty computation (SMC)[?]. TrustedPals allows to reduce SMC to the probl...
Roberto Cortiñas, Felix C. Freiling, Marjan...