Sciweavers

2022 search results - page 321 / 405
» Trust in Multi-Agent Systems
Sort
View
ICISC
2001
156views Cryptology» more  ICISC 2001»
15 years 1 months ago
A Distributed Light-Weight Authentication Model for Ad-hoc Networks
Abstract. In this work we present a security model for low-value transactions in ad-hoc networks in which we focus on authentication since this is the core requirement for commerci...
André Weimerskirch, Gilles Thonet
120
Voted
PST
2004
15 years 1 months ago
Future Trends in Mobile Commerce: Service Offerings, Technological Advances and Security Challenges
Driven by the ubiquitous deployment of mobile systems, the widespread use of the Internet, the rapid advances in wireless technologies, the insatiable demand for high-speed interac...
Ali Grami, Bernadette Schell
ESORICS
2010
Springer
15 years 1 months ago
Election Verifiability in Electronic Voting Protocols
We present a formal, symbolic definition of election verifiability for electronic voting protocols in the context of the applied pi calculus. Our definition is given in terms of bo...
Steve Kremer, Mark Ryan, Ben Smyth
DEBU
2008
59views more  DEBU 2008»
15 years 13 days ago
Social Wisdom for Search and Recommendation
Social-tagging communities offer great potential for smart recommendation and "socially enhanced" searchresult ranking. Beyond traditional forms of collaborative recomme...
Ralf Schenkel, Tom Crecelius, Mouna Kacimi, Thomas...
CN
2007
124views more  CN 2007»
15 years 11 days ago
Cryptographic techniques for mobile ad-hoc networks
In this paper, we propose some cryptographic techniques to securely set up a mobile ad-hoc network. The process is fully self-managed by the nodes, without any trusted party. New ...
Vanesa Daza, Javier Herranz, Paz Morillo, Carla R&...