Sciweavers

1351 search results - page 227 / 271
» Trust in Anonymity Networks
Sort
View
NDSS
2003
IEEE
15 years 3 months ago
Fighting Spam by Encapsulating Policy in Email Addresses
Everyday network interactions require users to give out their email address, yet no guarantees can be made about how this address will be used. Sometimes the address is given to a...
John Ioannidis
DSN
2002
IEEE
15 years 2 months ago
Distributed Object Middleware to Support Dependable Information Sharing between Organisations
Organisations increasingly use the Internet to offer their own services and to utilise the services of others. This naturally leads to information sharing across organisational bo...
Nick Cook, Santosh K. Shrivastava, Stuart M. Wheat...
DSN
2009
IEEE
15 years 1 months ago
HC-BGP: A light-weight and flexible scheme for securing prefix ownership
The Border Gateway Protocol (BGP) is a fundamental building block of the Internet infrastructure. However, due to the implicit trust assumption among networks, Internet routing re...
Ying Zhang, Zheng Zhang, Zhuoqing Morley Mao, Y. C...
COMCOM
2002
105views more  COMCOM 2002»
14 years 9 months ago
An intensive survey of fair non-repudiation protocols
With the phenomenal growth of the Internet and open networks in general, security services, such as non-repudiation, become crucial to many applications. Nonrepudiation services m...
Steve Kremer, Olivier Markowitch, Jianying Zhou
ENTCS
2008
390views more  ENTCS 2008»
14 years 8 months ago
Cryptographic Versus Trust-based Methods for MANET Routing Security
Mobile Ad-hoc Networks (MANETs) allow wireless nodes to form a network without requiring a fixed infrastructure. Early routing protocols for MANETs failed to take security issues ...
Jared Cordasco, Susanne Wetzel