Sciweavers

3299 search results - page 127 / 660
» Privacy and Trusted Computing
Sort
View
128
Voted
SIGECOM
2009
ACM
117views ECommerce» more  SIGECOM 2009»
15 years 11 months ago
Sybilproof transitive trust protocols
We study protocols to enable one user (the principal) to make potentially profitable but risky interactions with another user (the agent), in the absence of direct trust between ...
Paul Resnick, Rahul Sami
146
Voted
WETICE
1998
IEEE
15 years 8 months ago
The Problem with Multiple Roots in Web Browsers - Certificate Masquerading
Much work is going into securing the public key infrastructure (PKI). Various models for trust exist; Pretty Good Privacy (PGP) and the Progressive-Constraint Trust model are exam...
James M. Hayes
JTAER
2006
78views more  JTAER 2006»
15 years 4 months ago
The Social Dimensions of the Security of Internet banking
This paper examines the users' perspective on the security of Internet banking in Australia within the social context. This user-centered design approach supplements the tech...
Supriya Singh
155
Voted
GCC
2004
Springer
15 years 10 months ago
Trust Establishment in Large Scale Grid Settings
Trust establishment is hard in grid architecture by the ad hoc nature. To set up trust in large scale of network is more difficult. In this paper, we propose an automatic key manag...
Bo Zhu, Tieyan Li, Huafei Zhu, Mohan S. Kankanhall...
APSCC
2008
IEEE
15 years 6 months ago
Understanding Cyber Trust Using a Triadic Functioning Analysis
Although social informatics has been a subject of systematic analytical and critical research for more than three decades, previous research has rarely noted the importance of soc...
Wen-Kung Lin, Chieh-Peng Lin, Chou-Kang Chiu