Sciweavers

2022 search results - page 322 / 405
» Trust in Multi-Agent Systems
Sort
View
92
Voted
CSI
2007
91views more  CSI 2007»
15 years 10 days ago
Implementing regular cash with blind fixed-value electronic coins
We propose a generic framework for the development of an off-line peer-to-peer electronic payment system with fixed-value electronic coins. The proposed scheme simulates the issua...
Dimitrios Lekkas, Diomidis Spinellis
97
Voted
CJ
2004
93views more  CJ 2004»
15 years 6 days ago
An Architecture for Kernel-Level Verification of Executables at Run Time
Digital signatures have been proposed by several researchers as a way of preventing execution of malicious code. In this paper we propose a general architecture for performing the...
Luigi Catuogno, Ivan Visconti
SAJ
2002
97views more  SAJ 2002»
15 years 13 hour ago
PrivGuard : a model to protect private information based on its usage
No reliable method currently exists to safeguard the privacy of private information. Privacy policies are insufficient as compliance can not be enforced automatically. In this pap...
Frans A. Lategan, Martin S. Olivier
114
Voted
TC
1998
15 years 12 hour ago
Resilient Authentication Using Path Independence
—Authentication using a path of trusted intermediaries, each able to authenticate the next in the path, is a well-known technique for authenticating channels in a large distribut...
Michael K. Reiter, Stuart G. Stubblebine
ACSAC
2010
IEEE
14 years 10 months ago
Two methodologies for physical penetration testing using social engineering
Penetration tests on IT systems are sometimes coupled with physical penetration tests and social engineering. In physical penetration tests where social engineering is allowed, th...
Trajce Dimkov, Wolter Pieters, Pieter H. Hartel