نتایج جستجو برای: basic trust
تعداد نتایج: 329153 فیلتر نتایج به سال:
We present a protocol for secure 2-party computation based on homomorphic encryption along with a basic implementation of the protocol. Secure 2-party computation allows two parties to compute some function of their respective inputs in collaboration without revealing the inputs, unless both parties agree to do so. The presented protocol is based on additive sharing and homomorphic encryption a...
In mobile teamwork environments two basic problems exist: how to discover someone based on a profile (skills, reputations) and how to assess that person’s “credibility” (trust). A lot of work has been done on the issues of collecting and spreading reputations and subsequent computation of trust. The application of such data for decision making, however, is still missing. In this paper we presen...
In this paper, an approach for managing behaviour trust of participants in Grid computing environments is presented. The basic idea of the approach is to view the interaction process between Grid participants similar to an industrial production process, and use statistical methods of quality assurance to discover deviations in the behaviour of Grid participants in order to assess their behaviou...
Trust and cooperation increase from adolescence to adulthood, but studies on gender differences in this development are rare. We investigated gender and age-related differences in trust and reciprocity and associated neural mechanisms in 43 individuals (16-27 years, 22 male). Participants played two multi-round trust games with a cooperative and an unfair partner. Males showed more basic trust ...
Trust and reputation are important factors that influence the success of both traditional transactions in physical social networks and modern e-commerce in virtual Internet environments. It is difficult to define the concept of trust and quantify it because trust has both subjective and objective characteristics at the same time. A well-reported issue with reputation management system in busine...
For wireless sensor networks (WSNs), many factors, such as mutual interference of wireless links, battlefield applications and nodes exposed to the environment without good physical protection, result in the sensor nodes being more vulnerable to be attacked and compromised. In order to address this network security problem, a novel trust evaluation algorithm defined as NBBTE (Node Behavioral St...
Trust has been considered the "cement" of a society and is much studied in sociology and other social sciences. Most studies, however, have neglected one important aspect of trust: it involves an act of forgiving and showing tolerance toward another's failure. In this study, we refer to this concept as "generous trust" and examine the conditions under which generous trust becomes a more viable ...
In this dissertation we study the security and survivability of wireless mobile network systems in two distinct threat models: the Byzantine threat model and the selfish node threat model. Wireless mobile networks are collections of self-organizing mobile nodes with dynamic topologies and have no fixed infrastructure. Because of their dynamic ad hoc nature, these networks are particularly vulne...
In a reputation-based trust-management system, agents maintain information about the past behaviour of other agents. This information is used to guide future trust-based decisions about interaction. However, while trust management is a component in security decision-making, few existing reputation-based trustmanagement systems aim to provide any formal security-guarantees. We describe a mathema...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید