Sciweavers

1381 search results - page 39 / 277
» Trusted Computing: Providing Security for Peer-to-Peer Netwo...
Sort
View
92
Voted
COMCOM
2007
149views more  COMCOM 2007»
14 years 10 months ago
Adaptive security design with malicious node detection in cluster-based sensor networks
Distributed wireless sensor networks have problems on detecting and preventing malicious nodes, which always bring destructive threats and compromise multiple sensor nodes. Theref...
Meng-Yen Hsieh, Yueh-Min Huang, Han-Chieh Chao
WAC
2005
Springer
122views Communications» more  WAC 2005»
15 years 4 months ago
Trust Management Issues for Ad Hoc and Self-organized Networks
Self-organized and ad hoc communications have many fundamental principles in common and also face similar problems in the domains of security and Quality of Service. Trust manageme...
Vassileios Tsetsos, Giannis F. Marias, Sarantis Pa...
123
Voted
CIKM
2009
Springer
15 years 5 months ago
StereoTrust: a group based personalized trust model
Trust plays important roles in diverse decentralized environments, including our society at large. Computational trust models help to, for instance, guide users’ judgements in o...
Xin Liu, Anwitaman Datta, Krzysztof Rzadca, Ee-Pen...
CCS
2007
ACM
15 years 5 months ago
Ordered multisignatures and identity-based sequential aggregate signatures, with applications to secure routing
We construct two new multiparty digital signature schemes that allow multiple signers to sequentially produce a compact, fixed-length signature. First, we introduce a new primiti...
Alexandra Boldyreva, Craig Gentry, Adam O'Neill, D...
SACMAT
2003
ACM
15 years 4 months ago
Dynamic access control: preserving safety and trust for network defense operations
We investigate the cost of changing access control policies dynamically as a response action in computer network defense. We compare and contrast the use of access lists and capab...
Prasad Naldurg, Roy H. Campbell