scispace - formally typeset
Search or ask a question
Topic

Trusted third party

About: Trusted third party is a research topic. Over the lifetime, 2919 publications have been published within this topic receiving 60935 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: This letter proposes a location privacy protection method based on double ${k}$ -anonymity that hides user locations and request information and introduces the cloud server as a trusted third party to isolate the direct communication between users and the service provider.
Abstract: As an emerging complex social network, the Social Internet of Vehicles (SIoV) potentially exposes user location privacy. In this letter, we propose a location privacy protection method based on double ${k}$ -anonymity that hides user locations and request information. The cloud server is introduced as a trusted third party to isolate the direct communication between users and the service provider, while correlation between identities and requests is also reduced by means of a permutation and combination method. Extensive simulations are conducted to demonstrate that the method can protect user location privacy to the greatest extent possible while still ensuring service availability.

22 citations

Patent
13 Aug 2003
TL;DR: In this paper, a call processing system is used to screen outgoing calls from various callers according to a first set of criteria and if a call is not completed to a called party, a second set of requirements are used to determine if a message can be stored awaiting retrieval by the called party.
Abstract: Disclosed are systems and methods which allow a calling party to store messages for a called party even if the called party does not already have message storage facilities, provided the calling party and/or called party meet certain parameters. Delivery of the message is controlled by the called party and may require the called party to agree to pay for the message delivery service. In a further embodiment, a call processing system is operable to screen outgoing calls from various callers according to a first set of criteria and if a call is not completed to a called party a second set of criteria is used to determine if a message can be stored awaiting retrieval by the called party. If desired, a return message from a called party to a calling party can be stored.

22 citations

Patent
01 Jul 1996
TL;DR: In this paper, a system and method for lightweight non-repudiability for networked computer systems is presented, where each party to a two-party communication maintains hashes on its incoming and outgoing messages.
Abstract: A system and method is disclosed that provides lightweight non-repudiability for networked computer systems. Each party to a two-party communication maintains hashes on its incoming and outgoing messages. At its discretion, either party can request that the other party commit to the conversation. The second party (if it agrees) then sends signed hashes that third parties can use to verify the content of the conversation. The party requesting the commitment stores its corresponding hashes when it sends the request. If the hashes from both parties are the same for the same positions in their conversation, the two parties can verify that their conversation is error-free. If the sending party also maintains logs of both sides (incoming and outgoing) of the conversation and stores hashes corresponding to the beginning of the logs, the sending party is also able to verify to a third party that the logged portion of the conversation was between the first party and the second party. Non-repudiability for entire conversations consisting of millions of messages can therefore be provided using a single pair of commit message and commitment/signature messages.

22 citations

Patent
07 May 2007
TL;DR: In this article, a method and apparatus for performing a caller investigation in order to provide relation information to a called party regarding an unknown calling party, when implemented in a service entity serving said called party, is presented.
Abstract: A method and apparatus for performing a caller investigation in order to provide relation information to a called party (200) regarding an unknown calling party (202), when implemented in a service entity (204) serving said called party. A relation query for the calling party is received from the called party, and it is then determined whether the calling party is known and related to any third party directly or indirectly known to the called party by checking a contact list (210-214) defined for said third party. The reliability of the calling party can then be better assessed based on how the calling party is related to the called party, if related at all. The called party may use this information for deciding how to respond to a communication request from said calling party.

22 citations

Book ChapterDOI
22 Aug 2004
TL;DR: A trusted third party can check and certify the data sent from a node A to a node B, so that B can have some confidence in the properties of the data despite A's possible incompetence or malice.
Abstract: Trusted Computing gives rise to a new supply of trusted third parties on which distributed systems can potentially rely They are the secure system components (hardware and software) built into nodes with Trusted Computing capabilities These trusted third parties may be used for supporting communications in distributed systems In particular, a trusted third party can check and certify the data sent from a node A to a node B, so that B can have some confidence in the properties of the data despite A ’s possible incompetence or malice We present and explore this application of Trusted Computing, both in general and in specific instantiations

22 citations


Network Information
Related Topics (5)
Encryption
98.3K papers, 1.4M citations
90% related
Server
79.5K papers, 1.4M citations
85% related
Wireless ad hoc network
49K papers, 1.1M citations
84% related
Mobile computing
51.3K papers, 1M citations
83% related
Network packet
159.7K papers, 2.2M citations
83% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202321
202240
2021125
2020201
2019179
2018177