Sciweavers

2907 search results - page 8 / 582
» Trust analysis with clustering
Sort
View
SUTC
2006
IEEE
15 years 3 months ago
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation
Security in wireless ad hoc networks is hard to achieve due to the vulnerability of its links, limited physical protection, and the absence of a centralized management point. Cons...
Edith C. H. Ngai, Michael R. Lyu
77
Voted
ICCCN
2008
IEEE
15 years 3 months ago
Sources and Monitors: A Trust Model for Peer-to-Peer Networks
—In this paper, we introduce an objective model of trust in peer-to-peer networks. Based on this model, we develop protocols that can be used by the peers in a peer-to-peer netwo...
Yan Li, Mohamed G. Gouda
ATAL
2006
Springer
15 years 1 months ago
Monopolizing markets by exploiting trust
We investigate trust-based relationships in electronic supply chains where trust is a measure of consistency in meeting negotiated contract deadlines. We consider scenarios where ...
Sandip Sen, Dipyaman Banerjee
81
Voted
BIS
2008
134views Business» more  BIS 2008»
14 years 11 months ago
Trustlet, Open Research on Trust Metrics
A trust metric is a technique for predicting how much a user of a social network might trust another user. This is especially beneficial in situations where most users are unknown ...
Paolo Massa, Kasper Souren
TJS
2011
71views more  TJS 2011»
14 years 3 months ago
Automatically constructing trusted cluster computing environment
Yongwei Wu, Chen Gang, Jia Liu, Rui Fang, Xiaomeng...