Sciweavers

422 search results - page 42 / 85
» Walking the Web of Trust
Sort
View
INFOCOM
2012
IEEE
13 years 2 months ago
SybilDefender: Defend against sybil attacks in large social networks
—Distributed systems without trusted identities are particularly vulnerable to sybil attacks, where an adversary creates multiple bogus identities to compromise the running of th...
Wei Wei, Fengyuan Xu, Chiu Chiang Tan, Qun Li
PAKDD
2010
ACM
179views Data Mining» more  PAKDD 2010»
15 years 4 months ago
Answer Diversification for Complex Question Answering on the Web
We present a novel graph ranking model to extract a diverse set of answers for complex questions via random walks over a negative-edge graph. We assign a negative sign to edge weig...
Palakorn Achananuparp, Xiaohua Hu, Tingting He, Ch...
WEBDB
2007
Springer
85views Database» more  WEBDB 2007»
15 years 6 months ago
Corroborating Answers from Multiple Web Sources
The Internet has changed the way people look for information. Users now expect the answers to their questions to be available through a simple web search. Web search engines are i...
Minji Wu, Amélie Marian
ACSAC
2004
IEEE
15 years 3 months ago
Open-Source Applications of TCPA Hardware
How can Alice trust computation occurring at Bob's computer? Since it exists and is becoming ubiquitous, the current-generation TCPA/TCG hardware might enable a solution. Whe...
John Marchesini, Sean W. Smith, Omen Wild, Joshua ...
WWW
2007
ACM
16 years 15 days ago
Simple authentication for the web
Automated email-based password reestablishment (EBPR) is an efficient, cost-effective means to deal with forgotten passwords. In this technique, email providers authenticate users ...
Timothy W. van der Horst, Kent E. Seamons