Sciweavers

947 search results - page 83 / 190
» HMM-Based Trust Model
Sort
View
98
Voted
ISCC
2005
IEEE
132views Communications» more  ISCC 2005»
15 years 6 months ago
A Reputation-Based Trust Mechanism for Ad Hoc Networks
— The main characterisrics of ad hoc networks are the lack of predefined infrastructure and the dynamic topology. These characteristics present some new security vulnerabilities...
Yacine Rebahi, Vicente E. Mujica V, Dorgham Sisale...
115
Voted
DBSEC
2009
110views Database» more  DBSEC 2009»
15 years 1 months ago
Enforcing Confidentiality Constraints on Sensitive Databases with Lightweight Trusted Clients
Existing approaches for protecting sensitive information stored (outsourced) at external "honest-but-curious" servers are typically based on an overlying layer of encrypt...
Valentina Ciriani, Sabrina De Capitani di Vimercat...
80
Voted
HICSS
2009
IEEE
108views Biometrics» more  HICSS 2009»
15 years 7 months ago
E-File Adoption: A Study of U.S. Taxpayers' Intentions
In the United States, congress has set goals for the diffusion of e-government initiatives. One of congress’ goals for 2007 was for 80% of tax and informational returns to be fil...
L. Christian Schaupp, Lemuria Carter, Jeff Hobbs
USS
2010
14 years 10 months ago
Idle Port Scanning and Non-interference Analysis of Network Protocol Stacks Using Model Checking
Idle port scanning uses side-channel attacks to bounce scans off of a "zombie" host to stealthily scan a victim IP address and determine if a port is open or closed, or ...
Roya Ensafi, Jong Chun Park, Deepak Kapur, Jedidia...
WEBI
2010
Springer
14 years 10 months ago
Let's Trust Users It is Their Search
The current search engine model considers users not trustworthy, so no tools are provided to let them specify what they are looking for or in what context, which severely limits wh...
Pavel Kalinov, Bela Stantic, Abdul Sattar