Sciweavers

1715 search results - page 264 / 343
» Trust and Reputation Systems
Sort
View
BEHAVIOURIT
2011
14 years 4 months ago
Identity crisis: user perspectives on multiplicity and control in federated identity management
The research presented in this paper reports on three phases of an empirical user study that examines the relationship between identity and technology using contextual interviews,...
Christine Satchell, Graeme G. Shanks, Steve Howard...
IJNSEC
2011
78views more  IJNSEC 2011»
14 years 4 months ago
Multi-authority Electronic Voting Scheme Based on Elliptic Curves
In this paper, a new multi authority electronic voting scheme based on elliptic curves is proposed. According to the proposed scheme, each voter casts the vote as a point on the e...
Chinniah Porkodi, Ramalingam Arumuganathan, Krishn...
TKDE
2011
100views more  TKDE 2011»
14 years 4 months ago
Intertemporal Discount Factors as a Measure of Trustworthiness in Electronic Commerce
—In multiagent interactions, such as e-commerce and file sharing, being able to accurately assess the trustworthiness of others is important for agents to protect themselves fro...
Christopher J. Hazard, Munindar P. Singh
OSDI
2008
ACM
15 years 10 months ago
Hardware Enforcement of Application Security Policies Using Tagged Memory
Computers are notoriously insecure, in part because application security policies do not map well onto traditional protection mechanisms such as Unix user accounts or hardware pag...
Nickolai Zeldovich, Hari Kannan, Michael Dalton, C...
SIGCOMM
2006
ACM
15 years 3 months ago
SybilGuard: defending against sybil attacks via social networks
Peer-to-peer and other decentralized, distributed systems are known to be particularly vulnerable to sybil attacks. In a sybil attack, a malicious user obtains multiple fake ident...
Haifeng Yu, Michael Kaminsky, Phillip B. Gibbons, ...