Sciweavers

1715 search results - page 257 / 343
» Trust and Reputation Systems
Sort
View
HICSS
2008
IEEE
93views Biometrics» more  HICSS 2008»
15 years 4 months ago
An Exploration of the Hygiene and Motivator Aspects of WebQual Constructs in Predicting Website Reuse
Most existing studies of website characteristics and their impact on intentions have assumed a linear relationship between them. However, motivational theories suggest that while ...
Ben Q. Liu, Dale Goodhue
WIMOB
2008
IEEE
15 years 4 months ago
Random Beacon for Privacy and Group Security
Abstract—Most contemporary security mechanisms and protocols include exchange of random or time-variant nonces as an essential means of protection against replay and other threat...
Aleksi Saarela, Jan-Erik Ekberg, Kaisa Nyberg
WIMOB
2008
IEEE
15 years 4 months ago
A Protocol for Pervasive Distributed Computing Reliability
Abstract—The adoption of new hardware and software architectures will make future generations of pervasive devices more flexible and extensible. Networks of computational nodes ...
Alberto Ferrante, Roberto Pompei, Anastasia Stulov...
ACSAC
2007
IEEE
15 years 4 months ago
Centralized Security Labels in Decentralized P2P Networks
This paper describes the design of a peer-to-peer network that supports integrity and confidentiality labeling of shared data. A notion of data ownership privacy is also enforced...
Nathalie Tsybulnik, Kevin W. Hamlen, Bhavani M. Th...
CEEMAS
2007
Springer
15 years 4 months ago
Agent-Based Network Protection Against Malicious Code
This paper presents an agent-based approach to Network Intrusion Prevention on corporate networks, emphasizing the protection from fast-spreading mobile malicious code outbreaks (e...
Martin Rehák, Michal Pechoucek, Jan Tozicka...