Sciweavers

1351 search results - page 15 / 271
» Trust in Anonymity Networks
Sort
View
NDSS
2008
IEEE
15 years 4 months ago
Taming the Devil: Techniques for Evaluating Anonymized Network Data
Anonymization plays a key role in enabling the public release of network datasets, and yet there are few, if any, techniques for evaluating the efficacy of network data anonymiza...
Scott E. Coull, Charles V. Wright, Angelos D. Kero...
ACSAC
2002
IEEE
15 years 2 months ago
Networking in The Solar Trust Model: Determining Optimal Trust Paths in a Decentralized Trust Network
The Solar Trust Model provides a method by which the sender of a message can be authenticated, and the level of trust that can be placed in the sender of the message or the messag...
Michael Clifford
92
Voted
AINA
2009
IEEE
15 years 4 months ago
A Property Based Framework for Trust and Reputation in Mobile Computing
In this paper we reinforce the benefits of a trust based approach in mobile multi-agent systems. Whilst we do not specify a trust model we provide a framework for property based ...
Kevin Jones, Helge Janicke, Antonio Cau
96
Voted
PKC
1999
Springer
86views Cryptology» more  PKC 1999»
15 years 1 months ago
Preserving Privacy in Distributed Delegation with Fast Certificates
Abstract. In a distributed system, dynamically dividing execution between nodes is essential for service robustness. However, when all of the nodes cannot be equally trusted, and w...
Pekka Nikander, Yki Kortesniemi, Jonna Partanen
60
Voted
SUTC
2006
IEEE
15 years 3 months ago
DynamicTrust: The Trust Development in Peer-to-Peer Environments
In peer-to-peer (P2P) environments, trust is a very important issue when transactions/interactions occur between peers. In general, the trust evaluation on transactions/interactio...
Yang Wang, Vijay Viradharajan