Towards robust and effective trust management for security: A survey

D Wang, T Muller, Y Liu, J Zhang - 2014 IEEE 13th …, 2014 - ieeexplore.ieee.org
There is a need for robust and effective trust management. Different security problems result
in different requirements to the design of trust management, and the existing attacks in trust …

[HTML][HTML] Web3 Sybil avoidance using network latency

Q Stokkink, CU Ileri, D Epema, J Pouwelse - Computer Networks, 2023 - Elsevier
Web3 is emerging as the new Internet-interaction model that facilitates direct collaboration
between strangers without a need for prior trust between network participants and without …

[HTML][HTML] Building a reputation-based bootstrapping mechanism for newcomers in collaborative alert systems

MG Pérez, FG Mármol, GM Pérez… - Journal of Computer and …, 2014 - Elsevier
Today trust is a key factor in distributed and collaborative environments aimed to model
participating entitiesʼ behavior, and to foresee their further actions. Yet, prior to the first …

PJ-Sec: secure node joining in mobile P2P networks

SK Tetarave, S Tripathy - CCF Transactions on Pervasive Computing and …, 2021 - Springer
The advancement of portable mobile wireless devices such as smart-phones, brought
mobile peer-to-peer (P2P) as an extension of traditional P2P networks to provide efficient …

Making puzzles green and useful for adaptive identity management in large-scale distributed systems

WL da Costa Cordeiro, FR Santos, MP Barcellos… - Computer Networks, 2016 - Elsevier
Various online systems offer a lightweight process for creating accounts (eg, confirming an e-
mail address), so that users can easily join them. With minimum effort, however, an attacker …

[PDF][PDF] Defining cloud identity security and privacy issues: A Delphi method

B Cusack, E Ghazizadeh - 2019 - scholar.archive.org
The purpose of this study is to identify the potential security and privacy issues for the
entities providing cloud identity services known as cloud identity providers. We document …

Systems for Digital Self-Sovereignty

QA Stokkink - 2024 - research.tudelft.nl
The digital world is evolving toward representing-and serving the interconnection of-natural
persons. Instead of depending on the intrastructure of Big Tech companies and …

Riappa: a robust identity assignment protocol for p2p overlays

J Caubet, O Esparza, JL Muñoz, J Alins… - Security and …, 2014 - Wiley Online Library
ABSTRACT Peer‐to‐peer (P2P) overlay networks have been proposed to solve routing
problems of big distributed infrastructures, even for Internet scale. But the research …

Efficient approaches to mitigate the effect of Sybil attack in manet for high network lifetime: A review

R Kumari, M Dutta - 2018 Fifth International Conference on …, 2018 - ieeexplore.ieee.org
MANET is known as a self configuring, dynamic infrastructure to connect mobile devices
through wireless. There are several challenges which affect the MANET, such as routing …

[PDF][PDF] Quantifying and Improving the Robustness of Trust Systems.

D Wang - AAMAS, 2015 - personal.ntu.edu.sg
Trust (and reputation) systems help users evaluate trustworthiness of partners, which
support users to make decisions in various scenarios. Evaluating trust requires evidences …