Sciweavers

2022 search results - page 362 / 405
» Trust in Multi-Agent Systems
Sort
View
ICDE
2008
IEEE
141views Database» more  ICDE 2008»
15 years 4 months ago
Provenance-aware secure networks
Network accountability and forensic analysis have become increasingly important, as a means of performing network diagnostics, identifying malicious nodes, enforcing trust managem...
Wenchao Zhou, Eric Cronin, Boon Thau Loo
WETICE
2008
IEEE
15 years 4 months ago
Integrating Overlay and Social Networks for Seamless P2P Networking
In this paper we introduce Social VPNs, a novel system architecture which leverages existing social networking infrastructures to enable ad-hoc VPNs which are self-configuring, s...
Renato J. O. Figueiredo, P. Oscar Boykin, Pierre S...
HICSS
2007
IEEE
123views Biometrics» more  HICSS 2007»
15 years 4 months ago
The Case of Honda: A Dialectical yet Coherent Firm
—This conceptual paper proposes that Honda’s innovative prowess of producing both radical and disruptive innovations within their aerospace and automotive/pick-up truck develop...
W. David Holford, Mehran Ebrahimi
HICSS
2007
IEEE
116views Biometrics» more  HICSS 2007»
15 years 4 months ago
Fine-Grained and Scalable Approaches for Message Integrity
When we have multiple users compiling a single message, including shared contents, metadata, policy, and so on, the integrity of the contents created by individual users needs to ...
Joon S. Park, Ganesh Devarajan
ICC
2007
IEEE
114views Communications» more  ICC 2007»
15 years 4 months ago
Two-Factor Localized Authentication Scheme for WLAN Roaming
- In the paper, we propose an efficient two-factor localized authentication scheme suitable for WLAN roaming. The proposed authentication scheme can greatly improve the security co...
Xiaodong Lin, Haojin Zhu, Pin-Han Ho, Xuemin Shen