Sciweavers

683 search results - page 25 / 137
» Voting Technologies and Trust
Sort
View
71
Voted
ITRUST
2004
Springer
15 years 2 months ago
Analysing the Relationship between Risk and Trust
Among the various human factors impinging upon making a decision in an uncertain environment, risk and trust are surely crucial ones. Several models for trust have been proposed in...
Audun Jøsang, Stéphane Lo Presti
ITRUST
2005
Springer
15 years 3 months ago
Trust Transfer: Encouraging Self-recommendations Without Sybil Attack
Trading privacy for trust thanks to the linkage of pseudonyms has been proposed to mitigate the inherent conflict between trust and privacy. This necessitates fusionym, that is, th...
Jean-Marc Seigneur, Alan Gray, Christian Damsgaard...
FOSAD
2007
Springer
15 years 3 months ago
Trusted Mobile Platforms
This article addresses two main topics. Firstly, we review the operation of trusted computing technology, which now appears likely to be implemented in future mobile devices (inclu...
Eimear Gallery, Chris J. Mitchell
82
Voted
CHES
2009
Springer
140views Cryptology» more  CHES 2009»
15 years 10 months ago
On Tamper-Resistance from a Theoretical Viewpoint
Tamper-proof devices are pretty powerful. They can be used to have better security in applications. In this work we observe that they can also be maliciously used in order to defea...
Paulo Mateus, Serge Vaudenay
ESAS
2007
Springer
15 years 3 months ago
New Strategies for Revocation in Ad-Hoc Networks
Responding to misbehavior in ad-hoc and sensor networks is difficult. We propose new techniques for deciding when to remove nodes in a decentralized manner. Rather than blackballin...
Tyler Moore, Jolyon Clulow, Shishir Nagaraja, Ross...