Sciweavers

2846 search results - page 63 / 570
» Personalization of a Trust Network
Sort
View
PKC
2007
Springer
135views Cryptology» more  PKC 2007»
15 years 4 months ago
A Direct Anonymous Attestation Scheme for Embedded Devices
Abstract. Direct anonymous attestation (DAA) is an anonymous authentication scheme adopted by the Trusted Computing Group in its specifications for trusted computing platforms. Th...
He Ge, Stephen R. Tate
EKAW
2010
Springer
14 years 8 months ago
Extending Open Rating Systems for Ontology Ranking and Reuse
Abstract. Ontology reuse saves costs and improves interoperability between ontologies. Knowing which ontology to reuse is difficult without having a quality assessment. We employ u...
Holger Lewen, Mathieu d'Aquin
EUROPKI
2004
Springer
15 years 3 months ago
Distributing Security-Mediated PKI
The security-mediated approach to PKI offers several advantages, such as instant revocation and compatibility with standard RSA tools. In this paper, we present a design and protot...
Gabriel Vanrenen, Sean W. Smith
ITRUST
2005
Springer
15 years 3 months ago
Alleviating the Sparsity Problem of Collaborative Filtering Using Trust Inferences
Collaborative Filtering (CF), the prevalent recommendation approach, has been successfully used to identify users that can be characterized as “similar” according to their logg...
Manos Papagelis, Dimitris Plexousakis, Themistokli...
FC
2001
Springer
123views Cryptology» more  FC 2001»
15 years 2 months ago
Trust: A Collision of Paradigms
The technological challenges of securing networks are great, as recently witnessed in widespread denial of service and virus attacks. The human reaction to these attacks may be ei...
L. Jean Camp, Helen Nissenbaum, Cathleen McGrath