Sciweavers

4111 search results - page 9 / 823
» Security, Protocols, and Trust
Sort
View
89
Voted
TRUST
2010
Springer
14 years 10 months ago
Escrowed Data and the Digital Envelope
King Ables, Mark D. Ryan
109
Voted
JSW
2008
127views more  JSW 2008»
15 years 9 days ago
A Trust Based System for Enhanced Spam Filtering
The effectiveness of current anti-spam systems is limited by the ability of spammers to adapt to filtering techniques and the lack of incentive for mail servers to filter outgoing ...
Jimmy McGibney, Dmitri Botvich
COMPSAC
2003
IEEE
15 years 5 months ago
Facilitating Secure Ad hoc Service Discovery in Public Environments
Securely accessing unfamiliar services in public environments using ad hoc wireless networks is challenging. We present a proxy-based approach that uses other existing network cha...
Feng Zhu, Matt W. Mutka, Lionel M. Ni
GCC
2005
Springer
15 years 5 months ago
A Routing Protocol Based on Trust for MANETs
Abstract. Ad hoc network is a peer-to-peer grid system. The combination of the Knowledge Grid and ad hoc network could have a great effect on the future interconnection environment...
Cuirong Wang, Xiaozong Yang, Yuan Gao
CSFW
2006
IEEE
15 years 6 months ago
Resolve-Impossibility for a Contract-Signing Protocol
Abstract. A multi-party contract signing protocol allows a set of participants to exchange messages with each other with a view to arriving in a state in which each of them has a p...
Aybek Mukhamedov, Mark Dermot Ryan