Sciweavers

2022 search results - page 297 / 405
» Trust in Multi-Agent Systems
Sort
View
ACSAC
2009
IEEE
15 years 7 months ago
Enabling Secure Secret Sharing in Distributed Online Social Networks
—We study a new application of threshold-based secret sharing in a distributed online social network (DOSN), where users need a means to back up and recover their private keys in...
Le-Hung Vu, Karl Aberer, Sonja Buchegger, Anwitama...
DASFAA
2009
IEEE
252views Database» more  DASFAA 2009»
15 years 7 months ago
Optimal Privacy-Aware Path in Hippocratic Databases
Abstract. Privacy becomes a major concern for both customers and enterprises in today’s corporate marketing strategies, many research efforts have been put into developing new p...
Min Li, Xiaoxun Sun, Hua Wang, Yanchun Zhang
95
Voted
HICSS
2003
IEEE
136views Biometrics» more  HICSS 2003»
15 years 5 months ago
Value Positions for Financial Institutions in Electronic Bill Presentment and Payment (EBPP)
Business to consumer (B2C) electronic commerce has led to new relationships connecting various supply chain partners via the Internet, significantly increasing the quantity and qu...
Alea M. Fairchild
97
Voted
SP
2010
IEEE
158views Security Privacy» more  SP 2010»
15 years 4 months ago
Tamper Evident Microprocessors
Abstract—Most security mechanisms proposed to date unquestioningly place trust in microprocessor hardware. This trust, however, is misplaced and dangerous because microprocessors...
Adam Waksman, Simha Sethumadhavan
ALGORITHMICA
2004
132views more  ALGORITHMICA 2004»
15 years 10 days ago
A General Model for Authenticated Data Structures
Query answers from on-line databases can easily be corrupted by hackers or malicious database publishers. Thus it is important to provide mechanisms which allow clients to trust th...
Charles U. Martel, Glen Nuckolls, Premkumar T. Dev...