Sciweavers

1381 search results - page 41 / 277
» Trusted Computing: Providing Security for Peer-to-Peer Netwo...
Sort
View
TRUST
2009
Springer
15 years 5 months ago
Securing the Dissemination of Emergency Response Data with an Integrated Hardware-Software Architecture
During many crises, access to sensitive emergency-support information is required to save lives and property. For example, for effective evacuations first responders need the name...
Timothy E. Levin, Jeffrey S. Dwoskin, Ganesha Bhas...
EUROSYS
2008
ACM
15 years 8 months ago
Itrustpage: a user-assisted anti-phishing tool
Despite the many solutions proposed by industry and the research community to address phishing attacks, this problem continues to cause enormous damage. Because of our inability t...
Troy Ronda, Stefan Saroiu, Alec Wolman
FC
2006
Springer
108views Cryptology» more  FC 2006»
15 years 2 months ago
Uncheatable Reputation for Distributed Computation Markets
Reputation systems aggregate mutual feedback of interacting peers into a "reputation" metric for each participant. This is then available to prospective service "req...
Bogdan Carbunar, Radu Sion
CHI
2007
ACM
15 years 11 months ago
Trust 2.1: advancing the trust debate
Trust has a considerable research tradition in the CHI community. It has been investigated in the context of e-commerce, virtual teams, online gaming, social networking ? to name ...
Jens Riegelsberger, Asimina Vasalou
ACMICEC
2004
ACM
148views ECommerce» more  ACMICEC 2004»
15 years 4 months ago
A secure and private clarke tax voting protocol without trusted authorities
Electronic voting has become one of the most popular activities over the Internet. Security and privacy are always regarded as crucial factors in electronic voting system design. ...
Changjie Wang, Ho-fung Leung