Sciweavers

3299 search results - page 165 / 660
» Privacy and Trusted Computing
Sort
View
129
Voted
ASIACRYPT
2001
Springer
15 years 8 months ago
Secure Human Identification Protocols
One interesting and important challenge for the cryptologic community is that of providing secure authentication and identification for unassisted humans. There are a range of prot...
Nicholas J. Hopper, Manuel Blum
SAC
2010
ACM
15 years 12 months ago
Trustworthy interaction balancing in mixed service-oriented systems
Web-based collaboration systems typically require dynamic and context-based interactions between people and services. To support such complex interaction scenarios, we introduce a...
Florian Skopik, Daniel Schall, Schahram Dustdar
CSREASAM
2006
15 years 6 months ago
Finding Minimum Optimal Path Securely Using Homomorphic Encryption Schemes in Computer Networks
- In this paper we find a secure routing protocol for computer networks, which finds minimum optimum path using homomorphic encryption schemes. We briefly look into the existing ho...
Levent Ertaul, Vaidehi Kedlaya
ATAL
2010
Springer
15 years 6 months ago
Hybrid transitive trust mechanisms
Establishing trust amongst agents is of central importance to the development of well-functioning multi-agent systems. For example, the anonymity of transactions on the Internet c...
Jie Tang, Sven Seuken, David C. Parkes
PERCOM
2003
ACM
16 years 4 months ago
Trust for Ubiquitous, Transparent Collaboration
Brian Shand, Nathan Dimmock, Jean Bacon