Sciweavers

4111 search results - page 76 / 823
» Security, Protocols, and Trust
Sort
View
83
Voted
ATVA
2007
Springer
89views Hardware» more  ATVA 2007»
15 years 6 months ago
Policies and Proofs for Code Auditing
Abstract. Both proofs and trust relations play a role in security decisions, in particular in determining whether to execute a piece of code. We have developed a language, called B...
Nathan Whitehead, Jordan Johnson, Martín Ab...
87
Voted
ATAL
2007
Springer
15 years 4 months ago
Towards provably secure trust and reputation systems in e-marketplaces
In this paper, we present a framework for evaluating the security of trust and reputation systems for electronic marketplaces populated with buying and selling agents. Our propose...
Reid Kerr, Robin Cohen
101
Voted
ICISC
2001
89views Cryptology» more  ICISC 2001»
15 years 2 months ago
An Optimistic Multi-party Fair Exchange Protocol with Reduced Trust Requirements
In 1999, Bao et al. proposed [5] a multi-party fair exchange protocol of electronic items with an offline trusted third party. In this protocol, a coalition including the initiator...
Nicolás González-Deleito, Olivier Ma...
104
Voted
ESAS
2006
Springer
15 years 4 months ago
Cryptographic Protocol to Establish Trusted History of Interactions
In the context of ambient networks, this article describes a cryptographic protocol called Common History Extraction (CHE) protocol implementing a trust management framework. All t...
Samuel Galice, Marine Minier, John Mullins, St&eac...
95
Voted
ISI
2006
Springer
15 years 18 days ago
A Trust-Based Security Architecture for Ubiquitous Computing Systems
Hung Le Xuan, Pho Duc Giang, Yonil Zhung, Tran Van...