Sciweavers

441 search results - page 46 / 89
» Vulnerabilities and Threats in Distributed Systems
Sort
View
IPPS
2007
IEEE
15 years 6 months ago
Transaction Based Authentication Scheme for Mobile Communication: A Cognitive Agent Based Approach
The vulnerable air interface, device level constraints, and insecure encryption techniques of wireless networks have naturally increased the chance of attacker obtaining users inf...
B. Sathish Babu, Pallapa Venkataram
HICSS
2003
IEEE
211views Biometrics» more  HICSS 2003»
15 years 5 months ago
Effective Intrusion Detection Using Multiple Sensors in Wireless Ad Hoc Networks
In this paper we propose a distributed intrusion detection system for ad hoc wireless networks based on mobile agent technology. Wireless networks are particularly vulnerable to i...
Oleg Kachirski, Ratan K. Guha
ITNG
2007
IEEE
15 years 6 months ago
Securing Agent-Oriented Systems: An Argumentation and Reputation-based Approach
In this paper, we propose a new model for securing agent-based systems in which agents are equipped with reasoning capabilities allowing them to interact with each other. The agen...
Jamal Bentahar, John-Jules Ch. Meyer, Bernard Moul...
COLCOM
2007
IEEE
15 years 6 months ago
Countering feedback sparsity and manipulation in reputation systems
—Reputation systems provide a promising way for building trust through social control in collaborative communities by harnessing the community knowledge in the form of feedback. ...
Li Xiong, Ling Liu, Mustaque Ahamad
ISPA
2005
Springer
15 years 5 months ago
Decoupling Service and Feedback Trust in a Peer-to-Peer Reputation System
Abstract. Reputation systems help peers decide whom to trust before undertaking a transaction. Conventional approaches to reputation-based trust modeling assume that peers reputed ...
Gayatri Swamynathan, Ben Y. Zhao, Kevin C. Almerot...