Sciweavers

495 search results - page 95 / 99
» Signed quorum systems
Sort
View
INFOCOM
2009
IEEE
15 years 4 months ago
Fighting Spam with the NeighborhoodWatch DHT
—In this paper, we present DHTBL, an anti-spam blacklist built upon a novel secure distributed hash table (DHT). We show how DHTBL can be used to replace existing DNS-based black...
Adam Bender, Rob Sherwood, Derek Monner, Nathan Go...
SECON
2008
IEEE
15 years 3 months ago
Fast Exclusion of Errant Devices from Vehicular Networks
—Vehicular networks, in which cars communicate wirelessly to exchange information on traffic conditions, offer a promising way to improve road safety. Yet ensuring the correct f...
Tyler Moore, Maxim Raya, Jolyon Clulow, Panagiotis...
MSS
2007
IEEE
100views Hardware» more  MSS 2007»
15 years 3 months ago
Efficient Logging and Replication Techniques for Comprehensive Data Protection
Mariner is an iSCSI-based storage system that is de­ signed to provide comprehensive data protection on com­ modity ATA disk and Gigabit Ethernet technologies while offering the...
Maohua Lu, Shibiao Lin, Tzi-cker Chiueh
AUSDM
2007
Springer
100views Data Mining» more  AUSDM 2007»
15 years 3 months ago
An E-Market Framework to Determine the Strength of Business Relationships between Intelligent Agents
When an agent enters in an e-Market for the first time, it has no historical information that can be used to determine the strength of business relationship with participant agen...
Khandaker Shahidul Islam
IAT
2006
IEEE
15 years 3 months ago
Trust Negotiations with Customizable Anonymity
Trust negotiation makes it possible for two parties to carry on secure transactions by first establishing trust through a bilateral, iterative process of requesting and disclosin...
Anna Cinzia Squicciarini, Abhilasha Bhargav-Spantz...