Search Word(s) in Title, Keywords, Authors, and Abstract: Trust

A Survey about Consensus Algorithms Used in Blockchain
Giang-Truong Nguyen and Kyungbaek Kim
Page: 101~128, Vol. 14, No.1, 2018

Keywords: Blockchain, Consensus Algorithm
Show / Hide Abstract

Internet of Things (IoT) Framework for Granting Trust among Objects
Vera Suryani, Selo Sulistyo and Widyawan Widyawan
Page: 1613~1627, Vol. 13, No.6, 2017

Keywords: Framework, Internet of Things, Privacy, Security, Trust
Show / Hide Abstract

Query with SUM Aggregate Function on Encrypted Floating-Point Numbers in Cloud
Taipeng Zhu, Xianxia Zou and Jiuhui Pan
Page: 573~589, Vol. 13, No.3, 2017

Keywords: Coding Scheme, DoubleListTree, Encryption, Floating-Point Numbers, Summation
Show / Hide Abstract

Comparative Study of Evaluating the Trustworthiness of Data Based on Data Provenance
Kuldeep Gurjar and Yang-Sae Moon
Page: 234~248, Vol. 12, No.2, 2016

Keywords: Data Provenance, Trustworthiness of Data, Data Quality, Trustworthiness Evaluation, Trust Score
Show / Hide Abstract

A Step towards User Privacy while Using Location-Based Services
Fizza Abbas and Heekuck Oh
Page: 618~627, Vol. 10, No.4, 2014
Keywords: Location Based Services, Location Privacy, Point of Interests
Show / Hide Abstract

Visual Monitoring System of Multi-Hosts Behavior for Trustworthiness with Mobile Cloud
Eun-Ha Song, Hyun-Woo Kim and Young-Sik Jeong
Page: 347~358, Vol. 8, No.2, 2012
Keywords: Hardware Hardening, TPM, TPB, Mobile Cloud, System Behavior Monitoring, BiT Profiling
Show / Hide Abstract

Ensuring Anonymity for LBSs in Smartphone Environment
Mohammed Alzaabi, Chan Yeob Yeun and Thomas Anthony Martin
Page: 121~136, Vol. 7, No.1, 2011
Keywords: Location Based Services, Anonymity, Location Information
Show / Hide Abstract

Efficient Proof of Vote Validity Without Honest-Verifier Assumption in Homomorphic E-Voting
Kun Peng
Page: 549~560, Vol. 7, No.3, 2011
Keywords: Efficient Proof, E-Voting
Show / Hide Abstract

Cryptanalysis on a Three Party Key Exchange Protocol-STPKE`
Shirisha Tallapally and R Padmavathy
Page: 43~52, Vol. 6, No.1, 2010
Keywords: STPKE’ Protocol, The Proposed Protocol, Undetectable Online Password Guessing Attack
Show / Hide Abstract

IPv4 Address Trading Using Resource Certificate
Cheol-Soon Park, Jae-Cheol Ryou and Yong-Tae Park
Page: 107~120, Vol. 6, No.1, 2010
Keywords: IP Address Trading, Resource PKI, Routing Security, IP Address Management
Show / Hide Abstract

DEESR: Dynamic Energy Efficient and Secure Routing Protocol for Wireless Sensor Networks in Urban Environments
Mohammad S. Obaidat, Sanjay K. Dhurandher, Deepank Gupta, Nidhi Gupta and Anupriya Asthana
Page: 269~294, Vol. 6, No.3, 2010
Keywords: Sensor Network, Security, Energy Efficiency, Routing, Dynamic Trust Factor
Show / Hide Abstract

Design of Cryptographic Hardware Architecture for Mobile Computing
Mooseop Kim, Youngsae Kim and Hyunsook Cho
Page: 187~196, Vol. 5, No.4, 2009
Keywords: Trusted Computing, MTM, Cryptographic circuit, RSA, HASH, Mobile Computing
Show / Hide Abstract

Addressing Mobile Agent Security through Agent Collaboration
Evens Jean, Yu Jiao and Ali R Hurson
Page: 43~53, Vol. 3, No.2, 2007
Keywords: Disk Striping, Multimedia System, Bandwidth
Show / Hide Abstract

Trusted Certificate Validation Scheme for Open LBS Application Based on XML Web Services
Kiyoung Moon, Namje Park, Kyoil Chung, Sungwon Sohn and Jaecheol Ryou
Page: 86~95, Vol. 1, No.1, 2005
Keywords: Location-based service, Open LBS security, XKMS, XML security, XML web services
Show / Hide Abstract