|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 80 occurrences of 65 keywords
|
|
|
Results
Found 97 publication records. Showing 97 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
61 | Jin-Hee Cho, Ananthram Swami, Ing-Ray Chen |
Modeling and Analysis of Trust Management for Cognitive Mission-Driven Group Communication Systems in Mobile Ad Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSE (2) ![In: Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, CSE 2009, Vancouver, BC, Canada, August 29-31, 2009, pp. 641-650, 2009, IEEE Computer Society, 978-1-4244-5334-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
52 | Simon Samwel Msanjila, Hamideh Afsarmanesh |
HICI: An Approach for Identifying Trust Elements The case of technological trust perspective in VBEs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Second International Conference on Availability, Reliability and Security, ARES 2007, The International Dependability Conference - Bridging Theory and Practice, April 10-13 2007, Vienna, Austria, pp. 757-764, 2007, IEEE Computer Society, 0-7695-2775-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
48 | Vidyaraman Sankaranarayanan, Shambhu J. Upadhyaya |
A Trust Assignment Model Based on Alternate Actions Payoff. ![Search on Bibsonomy](Pics/bibsonomy.png) |
iTrust ![In: Trust Management, 4th International Conference, iTrust 2006, Pisa, Italy, May 16-19, 2006, Proceedings, pp. 339-353, 2006, Springer, 3-540-34295-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Compensatory Transfers, Document Management Systems, Trust Metrics |
43 | Lei Li 0002, Yan Wang 0002 |
A Trust Vector Approach to Service-Oriented Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICWS ![In: 2008 IEEE International Conference on Web Services (ICWS 2008), September 23-26, 2008, Beijing, China, pp. 270-277, 2008, IEEE Computer Society, 978-0-7695-3310-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
43 | Yanjun Zuo, Brajendra Panda |
Component based trust management in the context of a virtual organization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2005 ACM Symposium on Applied Computing (SAC), Santa Fe, New Mexico, USA, March 13-17, 2005, pp. 1582-1588, 2005, ACM, 1-58113-964-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
recommendation, information flow, trust management, virtual organization |
42 | Simon Samwel Msanjila, Hamideh Afsarmanesh |
Specification of the TrustMan System for Assisting Management of VBEs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustBus ![In: Trust, Privacy and Security in Digital Business, 4th International Conference, TrustBus 2007, Regensburg, Germany, September 3-7, 2007, Proceedings, pp. 34-43, 2007, Springer, 978-3-540-74408-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Trust among organizations, TrustMan system, VBE |
38 | Lei Li 0002, Yan Wang 0002, Vijay Varadharajan |
Fuzzy Regression Based Trust Prediction in Service-Oriented Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ATC ![In: Autonomic and Trusted Computing, 6th International Conference, ATC 2009, Brisbane, Australia, July 7-9, 2009, Proceedings, pp. 221-235, 2009, Springer, 978-3-642-02703-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
37 | Richard Seymour, Gilbert L. Peterson |
A Trust-Based Multiagent System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSE (3) ![In: Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, CSE 2009, Vancouver, BC, Canada, August 29-31, 2009, pp. 109-116, 2009, IEEE Computer Society, 978-1-4244-5334-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
37 | Zhaoyu Liu, Anthony W. Joy, Robert A. Thompson |
A Dynamic Trust Model for Mobile Ad Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FTDCS ![In: 10th IEEE International Workshop on Future Trends of Distributed Computing Systems (FTDCS 2004), 26-28 May 2004, Suzhou, China, pp. 80-85, 2004, IEEE Computer Society, 0-7695-2118-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
36 | Li Jin, Zhengding Lu |
ASITL: Adaptive Secure Interoperation Using Trust-Level. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PAISI ![In: Intelligence and Security Informatics, Pacific Asia Workshop, PAISI 2007, Chengdu, China, April 11-12, 2007, Proceedings, pp. 117-128, 2007, Springer, 978-3-540-71548-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Trust-level, Access Control, Secure Interoperation |
34 | Ivonne Thomas, Christoph Meinel |
Enhancing Claim-Based Identity Management by Adding a Credibility Level to the Notion of Claims. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE SCC ![In: 2009 IEEE International Conference on Services Computing (SCC 2009), 21-25 September 2009, Bangalore, India, pp. 243-250, 2009, IEEE Computer Society, 978-0-7695-3811-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
34 | Maxim Raya, Panagiotis Papadimitratos, Virgil D. Gligor, Jean-Pierre Hubaux |
On Data-Centric Trust Establishment in Ephemeral Ad Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INFOCOM ![In: INFOCOM 2008. 27th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies, 13-18 April 2008, Phoenix, AZ, USA, pp. 1238-1246, 2008, IEEE, 978-1-4244-2026-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
33 | Michael Backes 0001, Stefan Lorenz, Matteo Maffei, Kim Pecina |
Brief announcement: anonymity and trust in distributed systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PODC ![In: Proceedings of the 29th Annual ACM Symposium on Principles of Distributed Computing, PODC 2010, Zurich, Switzerland, July 25-28, 2010, pp. 237-238, 2010, ACM, 978-1-60558-888-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
anonymity in decentralized systems, formal verification, cryptographic protocols |
33 | Seong-Soo Park 0001, Jong-Hyouk Lee, Tai-Myoung Chung |
Authentication Scheme Based on Trust and Clustering Using Fuzzy Control in Wireless Ad-Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (2) ![In: Computational Science and Its Applications - ICCSA 2009, International Conference, Seoul, Korea, June 29-July 2, 2009, Proceedings, Part II, pp. 345-360, 2009, Springer, 978-3-642-02456-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
clustering, ad-hoc networks, authentication, trust, fuzzy control |
33 | Joseph A. Cazier, Benjamin B. M. Shao, Robert D. St. Louis |
Sharing information and building trust through value congruence. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Syst. Frontiers ![In: Inf. Syst. Frontiers 9(5), pp. 515-529, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Value congruence, Privacy, Trust, Knowledge management, Information sharing, Ethics |
33 | Marijke Coetzee, Jan H. P. Eloff |
A Framework for Web Services Trust. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Security and Privacy in Dynamic Environments, Proceedings of the IFIP TC-11 21st International Information Security Conference (SEC 2006), 22-24 May 2006, Karlstad, Sweden, pp. 74-86, 2006, Springer, 0-387-33405-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
30 | Grzegorz Kolaczek |
Model for Trust Dynamics in Service Oriented Information Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCCI ![In: Computational Collective Intelligence. Semantic Web, Social Networks and Multiagent Systems, First International Conference, ICCCI 2009, Wroclaw, Poland, October 5-7, 2009. Proceedings, pp. 573-583, 2009, Springer, 978-3-642-04440-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Service Oriented Knowledge Utility, Service Oriented Architecture, Trust model |
29 | Indrajit Ray, Sudip Chakraborty |
A Framework for Flexible Access Control in Digital Library Systems. (PDF / PS) ![Search on Bibsonomy](Pics/bibsonomy.png) |
DBSec ![In: Data and Applications Security XX, 20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Sophia Antipolis, France, July 31-August 2, 2006, Proceedings, pp. 252-266, 2006, Springer, 3-540-36796-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
28 | Grzegorz Kolaczek |
A New Concept of Trust Modeling and Management in Complex Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KES (1) ![In: Knowledge-Based Intelligent Information and Engineering Systems, 12th International Conference, KES 2008, Zagreb, Croatia, September 3-5, 2008, Proceedings, Part I, pp. 237-244, 2008, Springer, 978-3-540-85562-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
28 | Yan Wang 0002, Lei Li 0002, Ee-Peng Lim |
Price Trust Evaluation in E-service Oriented Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CEC/EEE ![In: 10th IEEE International Conference on E-Commerce Technology (CEC 2008) / 5th IEEE International Conference on Enterprise Computing, E-Commerce and E-Services (EEE 2008), July 21-14, 2008, Washington, DC, USA, pp. 165-172, 2008, IEEE Computer Society, 978-0-7695-3340-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
28 | Dimitri Melaye, Yves Demazeau |
Bayesian Dynamic Trust Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CEEMAS ![In: Multi-Agent Systems and Applications IV, 4th International Central and Eastern European Conference on Multi-Agent Systems, CEEMAS 2005, Budapest, Hungary, September 15-17, 2005, Proceedings, pp. 480-489, 2005, Springer, 3-540-29046-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
28 | Zhongwei Zhang, Zhen Wang |
Assessing and Assuring Trust in E-Commerce Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIMCA/IAWTIC ![In: 2006 International Conference on Computational Intelligence for Modelling Control and Automation (CIMCA 2006), International Conference on Intelligent Agents, Web Technologies and Internet Commerce (IAWTIC 2006), 29 November - 1 December 2006, Sydney, Australia, pp. 124, 2006, IEEE Computer Society, 0-7695-2731-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Bader Ali, Wilfred Villegas, Muthucumaru Maheswaran |
A trust based approach for protecting user data in social networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CASCON ![In: Proceedings of the 2007 conference of the Centre for Advanced Studies on Collaborative Research, October 22-25, 2007, Richmond Hill, Ontario, Canada, pp. 288-293, 2007, IBM. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
25 | Mark A. Neerincx, Jan Willem Streefkerk |
Interacting in Desktop and Mobile Context: Emotion, Trust, and Task Performance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUSAI ![In: Ambient Intelligence, First European Symposium, EUSAI 2003, Veldhoven, The Netherlands, November 3.-4, 2003, Proceedings, pp. 119-132, 2003, Springer, 3-540-20418-0. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
25 | Li Jin, Zhengding Lu |
A Novel Secure Interoperation System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
International Conference on Computational Science (2) ![In: Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27 - 30, 2007, Proceedings, Part II, pp. 808-814, 2007, Springer, 978-3-540-72585-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Trust-level, Adaptive, Secure Interoperation |
24 | Lei Li 0002, Yan Wang 0002, Ee-Peng Lim |
Trust-Oriented Composite Service Selection and Discovery. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSOC/ServiceWave ![In: Service-Oriented Computing, 7th International Joint Conference, ICSOC-ServiceWave 2009, Stockholm, Sweden, November 24-27, 2009. Proceedings, pp. 50-67, 2009, 978-3-642-10382-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
24 | Yan Wang 0002, Kwei-Jay Lin |
Reputation-Oriented Trustworthy Computing in E-Commerce Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Internet Comput. ![In: IEEE Internet Comput. 12(4), pp. 55-59, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
24 | Stefano Bistarelli, Fabio Martinelli, Francesco Santini 0001 |
A Semantic Foundation for Trust Management Languages with Weights: An Application to the RTFamily. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ATC ![In: Autonomic and Trusted Computing, 5th International Conference, ATC 2008, Oslo, Norway, June 23-25, 2008, Proceedings, pp. 481-495, 2008, Springer, 978-3-540-69294-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
24 | Soon-Keow Chong, Jemal H. Abawajy |
Feedback Credibility Issues In Trust Management Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MUE ![In: 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 26-28 April 2007, Seoul, Korea, pp. 387-394, 2007, IEEE Computer Society, 978-0-7695-2777-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Ivonne Thomas, Michael Menzel 0001, Christoph Meinel |
Using quantified trust levels to describe authentication requirements in federated identity management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SWS ![In: Proceedings of the 5th ACM Workshop On Secure Web Services, SWS 2008, Alexandria, VA, USA, October 31, 2008, pp. 71-80, 2008, ACM, 978-1-60558-292-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
authentication and access control, trust levels, web service federation, trust management, federated identity management |
20 | Xiaoxun Sun, Hua Wang 0002, Jiuyong Li |
Injecting purpose and trust into data anonymisation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIKM ![In: Proceedings of the 18th ACM Conference on Information and Knowledge Management, CIKM 2009, Hong Kong, China, November 2-6, 2009, pp. 1541-1544, 2009, ACM, 978-1-60558-512-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
privacy, trust, anonymization |
20 | Indrajit Ray, Sudip Chakraborty |
Facilitating Privacy Related Decisions in Different Privacy Contexts on the Internet by Evaluating Trust in Recipients of Private Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Proceedings of The IFIP TC-11 23rd International Information Security Conference, IFIP 20th World Computer Congress, IFIP SEC 2008, September 7-10, 2008, Milano, Italy, pp. 605-620, 2008, Springer, 978-0-387-09698-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
20 | Pedro B. Velloso, Rafael P. Laufer, Otto Carlos Muniz Bandeira Duarte, Guy Pujolle |
Analyzing a human-based trust model for mobile ad hoc networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: Proceedings of the 13th IEEE Symposium on Computers and Communications (ISCC 2008), July 6-9, Marrakech, Morocco, pp. 240-245, 2008, IEEE Computer Society, 978-1-4244-2702-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
20 | Shingo Orihara, Yukio Tsuruoka, Kenji Takahashi |
Trusted-link: web-link enhancement for integrity and trustworthiness. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Identity Management ![In: Proceedings of the 2006 Workshop on Digital Identity Management, Alexandria, VA, USA, November 3, 2006, pp. 17-24, 2006, ACM, 1-59593-547-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
integrity, web, signature, link, trustworthiness |
19 | Cristina Satizábal, Jordi Forné, Rafael Martínez-Peláez, Francisco Rico-Novella |
Hierarchical Trust Architecture in a Mobile Ad-Hoc Network Using Ant Algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Third International Conference on Availability, Reliability and Security, ARES 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona , Spain, pp. 1000-1007, 2008, IEEE Computer Society, 978-0-7695-3102-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Certification Architectures, Ad-Hoc Networks, Ant Algorithms, Public Key Infrastructure (PKI), Certification Path |
19 | Manling Zhu, Zhi Jin |
Trust Analysis of Web Services Based on a Trust Ontology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KSEM ![In: Knowledge Science, Engineering and Management, Second International Conference, KSEM 2007, Melbourne, Australia, November 28-30, 2007, Proceedings, pp. 642-648, 2007, Springer, 978-3-540-76718-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Web Services, Formal Reasoning, Trust Ontology |
19 | Xudong Ni, Junzhou Luo |
A Trust Aware Access Control in Service Oriented Grid Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GCC ![In: Grid and Cooperative Computing, Sixth International Conference on Grid and Cooperative Computing, GCC 2007, August 16-18, 2007, Urumchi, Xinjiang, China, Proceedings, pp. 417-422, 2007, IEEE Computer Society, 0-7695-2871-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
19 | Xiaoyun Xue, Jean Leneutre, Jalel Ben-Othman |
A Trust-Based Routing Protocol for Ad Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MWCN ![In: Mobile and Wireless Communication Networks, IFIP TC6 / WG6.8 Conference on Mobile and Wireless Communication Networks (MWCN 2004), October 25-27, 2004, Paris, France, pp. 251-262, 2004, Kluwer/Springer, 0-387-23148-X. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
blackmail attack, Ad hoc networks, trust model, secure routing |
17 | P. Varalakshmi, T. Judgi |
Multifaceted trust management framework based on a trust level agreement in a collaborative cloud. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Electr. Eng. ![In: Comput. Electr. Eng. 59, pp. 110-125, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
16 | Isaac Agudo, Javier López 0001, José A. Montenegro |
Implementation aspects of a delegation system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MobiMedia ![In: Proceedings of the 3rd International Conference on Mobile Multimedia Communications, MobiMedia 2007, Nafpaktos, Greece, August 27-29, 2007, pp. 50, 2007, ICST, 978-963-06-2670-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Loay Abusalah, Ashfaq A. Khokhar, G. BenBrahim, W. ElHajj |
TARP: trust-aware routing protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWCMC ![In: Proceedings of the International Conference on Wireless Communications and Mobile Computing, IWCMC 2006, Vancouver, British Columbia, Canada, July 3-6, 2006, pp. 135-140, 2006, ACM, 1-59593-306-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
aware routing, trust, encryption, power, ad hoc |
16 | Seungtak Oh, Chilgee Lee, Hyunseung Choo |
Collaborative Trust-Based Shortest Secure Path Discovery in Mobile Ad Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
International Conference on Computational Science (2) ![In: Computational Science - ICCS 2006, 6th International Conference, Reading, UK, May 28-31, 2006, Proceedings, Part II, pp. 1089-1096, 2006, Springer, 3-540-34381-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
15 | Lei Li 0002, Yan Wang 0002 |
Trust Evaluation in Composite Services Selection and Discovery. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE SCC ![In: 2009 IEEE International Conference on Services Computing (SCC 2009), 21-25 September 2009, Bangalore, India, pp. 482-485, 2009, IEEE Computer Society, 978-0-7695-3811-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
15 | Hicham Ibrahim, Pradeep K. Atrey, Abdulmotaleb El-Saddik |
Semantic similarity based trust computation in websites. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MS ![In: Proceedings of the 1st ACM Workshop on The Many Faces of Multimedia Semantics, MS 2007, Augsburg, Bavaria, Germany, September 28, 2007, pp. 65-72, 2007, ACM, 978-1-59593-782-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
trust computation, semantic similarity |
15 | Jari Veijalainen |
Autonomy, Heterogeneity and Trust in Mobile P2P environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MUE ![In: 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 26-28 April 2007, Seoul, Korea, pp. 41-47, 2007, IEEE Computer Society, 978-0-7695-2777-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
15 | Abderrezak Rachedi, Abderrahim Benslimane |
Trust and Mobility-based Clustering Algorithm for Secure Mobile Ad Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSNC ![In: Proceedings of the International Conference on Systems and Networks Communications (ICSNC 2006), October 29 - November 3, 2006, Papeete, Tahiti, French Polynesia, pp. 72, 2006, IEEE Computer Society, 0-7695-2699-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
15 | Cuirong Wang, Xiaozong Yang, Yuan Gao |
A Routing Protocol Based on Trust for MANETs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GCC ![In: Grid and Cooperative Computing - GCC 2005, 4th International Conference, Beijing, China, November 30 - December 3, 2005, Proceedings, pp. 959-964, 2005, Springer, 3-540-30510-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
15 | Jengchung V. Chen, Yangil Park |
Trust and Privacy in Electronic Commerce. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EEE ![In: 2004 IEEE International Conference on e-Technology, e-Commerce, and e-Services (EEE 04), 29-31 March 2004, Taipei, Taiwan, pp. 117-120, 2004, IEEE Computer Society, 0-7695-2073-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
15 | Hanane El Bakkali, Bahia Idrissi Kaitouni |
A Predicate Calculus Logic for the PKI Trust Model Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NCA ![In: IEEE International Symposium on Network Computing and Applications (NCA 2001), October 8-10, 2001, Cambridge, MA, USA, pp. 368-371, 2001, IEEE Computer Society, 0-7695-1432-4. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
certificate policy, trust relationships, logic-based approach, authentication, certificate, PKI, trust model, predicate calculus |
15 | Michael A. Shepherd, Anil Dhonde, Carolyn R. Watters |
Building Trust for E-Commerce: Collaborating Label Bureaus. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISEC ![In: Topics in Electronic Commerce, Second International Symposium, ISEC 2001 Hong Kong, China, April 26-28, 2001, Proceedings, pp. 42-56, 2001, Springer, 3-540-41963-2. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
12 | Franz Baader, Martin Knechtel, Rafael Peñaloza |
A Generic Approach for Large-Scale Ontological Reasoning in the Presence of Access Restrictions to the Ontology's Axioms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISWC ![In: The Semantic Web - ISWC 2009, 8th International Semantic Web Conference, ISWC 2009, Chantilly, VA, USA, October 25-29, 2009. Proceedings, pp. 49-64, 2009, Springer, 978-3-642-04929-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
12 | Bo Yu 0019, Haiguang Chen, Min Yang 0002, Dilin Mao, Chuanshan Gao |
A Key Management Scheme for Cross-Layering Designs in Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPA ![In: Parallel and Distributed Processing and Applications, Third International Symposium, ISPA 2005, Nanjing, China, November 2-5, 2005, Proceedings, pp. 757-768, 2005, Springer, 3-540-29769-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
11 | Elisa Bertino, Chenyun Dai, Murat Kantarcioglu |
The Challenge of Assuring Data Trustworthiness. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DASFAA ![In: Database Systems for Advanced Applications, 14th International Conference, DASFAA 2009, Brisbane, Australia, April 21-23, 2009. Proceedings, pp. 22-33, 2009, Springer, 978-3-642-00886-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Data Integrity and Quality, Security, Policies |
11 | Emiliano De Cristofaro, Jens-Matthias Bohli, Dirk Westhoff |
FAIR: fuzzy-based aggregation providing in-network resilience for real-time wireless sensor networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the Second ACM Conference on Wireless Network Security, WISEC 2009, Zurich, Switzerland, March 16-19, 2009, pp. 253-260, 2009, ACM, 978-1-60558-460-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
secure aggregation, security, wireless sensor networks, fuzzy control, resilience |
11 | Carlos Aguilar Melchor, Boussad Ait Salem, Philippe Gaborit, Karim Tamine |
AntTrust: A Novel Ant Routing Protocol for Wireless Ad-hoc Network Based on Trust between Nodes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Third International Conference on Availability, Reliability and Security, ARES 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona , Spain, pp. 1052-1059, 2008, IEEE Computer Society, 978-0-7695-3102-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Marcin Seredynski, Pascal Bouvry, Mieczyslaw A. Klopotek |
Evolution of cooperation in ad hoc networks under game theoretic model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MOBIWAC ![In: Proceedings of the Forth ACM International Workshop on Mobility Management & Wireless Access, MOBIWAC 2006, Terromolinos, Spain, October 2, 2006, pp. 126-130, 2006, ACM, 1-59593-488-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
ad hoc networks, game theory, cooperation, selfish behavior |
10 | Fei Li 0006, Dongqing Xie, Wei Gao 0007, Kefei Chen, Guilin Wang, Roberto Metere |
A certificateless signature scheme and a certificateless public auditing scheme with authority trust level 3+. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Ambient Intell. Humaniz. Comput. ![In: J. Ambient Intell. Humaniz. Comput. 15(2), pp. 1317-1326, February 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
10 | Zhenwu Fang, Jinxiang Wang 0002, Jinhao Liang, Yongjun Yan, Dawei Pi, Hui Zhang 0019, Guodong Yin |
Authority Allocation Strategy for Shared Steering Control Considering Human-Machine Mutual Trust Level. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Intell. Veh. ![In: IEEE Trans. Intell. Veh. 9(1), pp. 2002-2015, January 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
10 | Bing Su, Ling Tong 0004 |
Transmission Protocol of Emergency Messages in VANET Based on the Trust Level of Nodes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 11, pp. 68243-68256, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
10 | Lishan Sun, Zeyu Cheng, Dewen Kong, Yan Xu, Shangwu Wen, Kangyu Zhang |
Modeling and analysis of human-machine mixed traffic flow considering the influence of the trust level toward autonomous vehicles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Simul. Model. Pract. Theory ![In: Simul. Model. Pract. Theory 125, pp. 102741, May 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
10 | Mary Jane C. Samonte, Jaden Gabriel M. Escarillo, Kenneth Go, Nicole Benedict A. Landrito, Jasleen K. Randhawa |
Determining the Trust Level of Senior High School Associated with the Use of AI-Powered Digital Assistants. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IMMS ![In: Proceedings of the 2023 6th International Conference on Information Management and Management Science, IMMS 2023, Chengdu, China, August 25-27, 2023, pp. 54-61, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
10 | Arpita Bhargava, Shekhar Verma |
DUEL: Dempster Uncertainty-Based Enhanced- Trust Level Scheme for VANET. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Intell. Transp. Syst. ![In: IEEE Trans. Intell. Transp. Syst. 23(9), pp. 15079-15090, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
10 | Gour C. Karmakar, Abdullahi Chowdhury, Rajkumar Das 0001, Joarder Kamruzzaman, Syed Mofizul Islam |
Assessing Trust Level of a Driverless Car Using Deep Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Intell. Transp. Syst. ![In: IEEE Trans. Intell. Transp. Syst. 22(7), pp. 4457-4466, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
10 | Pradosh Kumar Gantayat, Sadhna Mohapatra, Sandeep Kumar Panda |
Secure Trust Level Routing in Delay-Tolerant Network with Node Categorization Technique. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FICTA (1) ![In: Intelligent Data Engineering and Analytics - Proceedings of the 9th International Conference on Frontiers in Intelligent Computing: Theory and Applications (FICTA 2021), Aizawl, India, June 25-26, 2021., pp. 453-458, 2021, Springer, 978-981-16-6623-0. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
10 | Cheuk Yu Yeung, Lucas Chi Kwong Hui, Tat Wing Chim, Siu-Ming Yiu, Gongxian Zeng, Jingyue Chen |
Anonymous Counting Problem in Trust Level Warning System for VANET. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Veh. Technol. ![In: IEEE Trans. Veh. Technol. 68(1), pp. 34-48, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
10 | Hela Malouche, Youssef Ben Halima, Henda Ben Ghézala |
Trust level estimation for cloud service composition with inter-service constraints. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Ambient Intell. Humaniz. Comput. ![In: J. Ambient Intell. Humaniz. Comput. 10(12), pp. 4881-4899, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
10 | Li Zhang 0055, Liudong Xing, Anqing Liu, Keming Mao |
Multivalued Decision Diagrams-Based Trust Level Analysis for Social Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 7, pp. 180620-180629, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
10 | Tran Khanh Dang, Khanh T. K. Tran |
The Meeting of Acquaintances: A Cost-efficient Authentication Scheme for Light-weight Objects with Transient Trust Level and Plurality Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1903.10018, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
10 | Tran Khanh Dang, Khanh T. K. Tran |
The Meeting of Acquaintances: A Cost-Efficient Authentication Scheme for Light-Weight Objects with Transient Trust Level and Plurality Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secur. Commun. Networks ![In: Secur. Commun. Networks 2019, pp. 8123259:1-8123259:18, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
10 | Rui Guo 0005, Huixian Shi |
An Efficient Confidentiality Preserving Scheme Using Certificateless Encryption with High Trust Level. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Netw. Secur. ![In: Int. J. Netw. Secur. 20(1), pp. 78-87, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
10 | Rajganesh Nagarajan, Ramkumar Thirunavukarasu, Selvamuthukumaran Shanmugam |
A Fuzzy-Based Intelligent Cloud Broker with MapReduce Framework to Evaluate the Trust Level of Cloud Services Using Customer Feedback. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Fuzzy Syst. ![In: Int. J. Fuzzy Syst. 20(1), pp. 339-347, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
10 | Jian Shen 0001, Tianqi Zhou, Chin-Feng Lai, Jiguo Li 0001, Xiong Li 0002 |
Hierarchical Trust Level Evaluation for Pervasive Social Networking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 5, pp. 1178-1187, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
10 | Fei Li 0006, Wei Gao 0007, Dongqing Xie, Chunming Tang 0003 |
Certificateless Cryptography with KGC Trust Level 3 Revisited. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCCS (2) ![In: Cloud Computing and Security - Third International Conference, ICCCS 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part II, pp. 292-304, 2017, Springer, 978-3-319-68541-0. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
10 | Hamzeh Alabool, Ahmad Kamil Bin Mahmood |
A novel evaluation framework for improving trust level of Infrastructure as a Service. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Clust. Comput. ![In: Clust. Comput. 19(1), pp. 389-410, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
10 | Ahlem Kalaï, Wafa Abdelghani, Corinne Amel Zayani, Ikram Amous |
LoTrust: A social Trust Level model based on time-aware social interactions and interests similarity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: 14th Annual Conference on Privacy, Security and Trust, PST 2016, Auckland, New Zealand, December 12-14, 2016, pp. 428-436, 2016, IEEE, 978-1-5090-4379-8. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
10 | Olusegun Folorunso |
Knowledge Sharing Trust Level Measurement Adoption Model Based On Fuzzy Expert System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Inf. Sci. ![In: Comput. Inf. Sci. 8(2), pp. 89-101, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
10 | Pei-Wu Li, Wen-Feng Wang |
A novel group-centric secure information sharing model with trust level considered. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Wirel. Mob. Comput. ![In: Int. J. Wirel. Mob. Comput. 8(2), pp. 194-199, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
10 | Lu Chen, Qing Zhou, Liqiang Zhang, Yun Chen |
A Trust-Level Based Authorization Model Using Signaling Games. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UIC/ATC/ScalCom ![In: 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), Beijing, China, August 10-14, 2015, pp. 772-778, 2015, IEEE Computer Society, 978-1-4673-7211-4. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
10 | Andreas Roos, Steffen Druesedow, Mahya Ilaghi Hosseini, Gökhan Coskun, Sebastian Zickau |
Trust Level Based Data Storage and Data Access Control in a Distributed Storage Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MobileCloud ![In: 3rd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering, MobileCloud 2015, San Francisco, CA, USA, March 30 - April 3, 2015, pp. 169-176, 2015, IEEE Computer Society, 978-1-4799-8977-5. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
10 | Omar Ayadi, Naoufel Cheikhrouhou, Faouzi Masmoudi |
A decision support system assessing the trust level in supply chains based on information sharing dimensions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Ind. Eng. ![In: Comput. Ind. Eng. 66(2), pp. 242-257, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
10 | Mohammed Nadir Djedid |
A Collaborative Security Mechanism based on Reputation and Trust Level in Pervasive Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PECCS ![In: PECCS 2012 - Proceedings of the 2nd International Conference on Pervasive Embedded Computing and Communication Systems, Rome, Italy, 24-26 February, 2012, pp. 258-261, 2012, SciTePress, 978-989-8565-00-6. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP BibTeX RDF |
|
10 | Guomin Yang, Chik How Tan |
Certificateless cryptography with KGC trust level 3. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Theor. Comput. Sci. ![In: Theor. Comput. Sci. 412(39), pp. 5446-5457, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
10 | Namho Chung, Soon Jae Kwon |
Effect of trust level on mobile banking satisfaction: a multi-group analysis of information system success instruments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Behav. Inf. Technol. ![In: Behav. Inf. Technol. 28(6), pp. 549-562, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
10 | Mark Hoogendoorn, S. Waqar Jaffry |
The Influence of Personalities Upon the Dynamics of Trust and Reputation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSE (3) ![In: Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, CSE 2009, Vancouver, BC, Canada, August 29-31, 2009, pp. 263-270, 2009, IEEE Computer Society, 978-1-4244-5334-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
10 | Arjan Durresi, Mimoza Durresi, Leonard Barolli |
Secure Spatial Authentication for Mobile Stations In Hybrid 3G-WLAN Serving Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Third International Conference on Availability, Reliability and Security, ARES 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona , Spain, pp. 1325-1331, 2008, IEEE Computer Society, 978-0-7695-3102-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Location authentication, Communications, WLAN, Hybrid, cellular |
10 | Vincent Lenders, Emmanouil Koukoumidis, Pei Zhang 0001, Margaret Martonosi |
Location-based trust for mobile user-generated content: applications, challenges and implementations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HotMobile ![In: Proceedings of the 9th Workshop on Mobile Computing Systems and Applications, HotMobile 2008, Napa Valley, California, USA, February 25-26, 2008, pp. 60-64, 2008, ACM, 978-1-60558-118-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
8 | Valentina Casola, Nicola Mazzocca, Jesus Luna, Oscar Manso, Manel Medina |
Static evaluation of Certificate Policies for GRID PKIs interoperability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Second International Conference on Availability, Reliability and Security, ARES 2007, The International Dependability Conference - Bridging Theory and Practice, April 10-13 2007, Vienna, Austria, pp. 391-399, 2007, IEEE Computer Society, 0-7695-2775-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
6 | Zeeshan-ul-hassan Usmani, Fawzi A. Alghamdi, Talal Naveed Puri |
Intelligent Web Interactions - What, When and How? ![Search on Bibsonomy](Pics/bibsonomy.png) |
Web Intelligence/IAT Workshops ![In: Proceedings of the 2008 IEEE/WIC/ACM International Conference on Web Intelligence and International Conference on Intelligent Agent Technology - Workshops, 9-12 December 2008, Sydney, NSW, Australia, pp. 195-198, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
6 | Sebastian Gajek, Ahmad-Reza Sadeghi, Christian Stüble, Marcel Winandy |
Compartmented Security for Browsers - Or How to Thwart a Phisher with Trusted Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Second International Conference on Availability, Reliability and Security, ARES 2007, The International Dependability Conference - Bridging Theory and Practice, April 10-13 2007, Vienna, Austria, pp. 120-127, 2007, IEEE Computer Society, 0-7695-2775-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
6 | Wun-She Yap, Sherman S. M. Chow, Swee-Huay Heng, Bok-Min Goi |
Security Mediated Certificateless Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, 5th International Conference, ACNS 2007, Zhuhai, China, June 5-8, 2007, Proceedings, pp. 459-477, 2007, Springer, 978-3-540-72737-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
security mediated, SMC cryptography, certificateless |
6 | Frederic Stumpf, Michael Benz, Martin Hermanowski, Claudia Eckert 0001 |
An Approach to a Trustworthy System Architecture Using Virtualization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ATC ![In: Autonomic and Trusted Computing, 4th International Conference, ATC 2007, Hong Kong, China, July 11-13, 2007, Proceedings, pp. 191-202, 2007, Springer, 978-3-540-73546-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
6 | Mark-Alexander Sujan, Michael D. Harrison, Alison Steven, Pauline H. Pearson, Susan J. Vernon |
Demonstration of Safety in Healthcare Organisations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAFECOMP ![In: Computer Safety, Reliability, and Security, 25th International Conference, SAFECOMP 2006, Gdansk, Poland, September 27-29, 2006, Proceedings, pp. 219-232, 2006, Springer, 3-540-45762-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
6 | Barbara Carminati, Elena Ferrari, Andrea Perego |
Rule-Based Access Control for Social Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OTM Workshops (2) ![In: On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, OTM Confederated International Workshops and Posters, AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET, OnToContent, ORM, PerSys, OTM Academy Doctoral Consortium, RDDS, SWWS, and SeBGIS 2006, Montpellier, France, October 29 - November 3, 2006. Proceedings, Part II, pp. 1734-1744, 2006, Springer, 3-540-48273-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
6 | Wun-She Yap, Swee-Huay Heng, Bok-Min Goi |
An Efficient Certificateless Signature Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUC Workshops ![In: Emerging Directions in Embedded and Ubiquitous Computing, EUC 2006 Workshops: NCUS, SecUbiq, USN, TRUST, ESO, and MSA, Seoul, Korea, August 1-4, 2006, Proceedings, pp. 322-331, 2006, Springer, 3-540-36850-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
bilinear pairing, signature scheme, Certificateless |
6 | Dae Hyun Yum, Pil Joong Lee |
Generic Construction of Certificateless Signature. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy: 9th Australasian Conference, ACISP 2004, Sydney, Australia, July 13-15, 2004. Proceedings, pp. 200-211, 2004, Springer, 3-540-22379-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
public-key signature, identity-based signature, Certificateless signature |
6 | Daniela E. Damian, Didar Zowghi |
RE challenges in multi-site software development organisations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Requir. Eng. ![In: Requir. Eng. 8(3), pp. 149-160, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Communication problems, Requirements engineering, Global software development, Requirements management, Requirements process |
6 | Daniela E. Damian, Didar Zowghi |
The Impact of Stakeholders? Geographical Distribution on Managing Requirements in a Multi-Site Organization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RE ![In: 10th Anniversary IEEE Joint International Conference on Requirements Engineering (RE 2002), 9-13 September 2002, Essen, Germany, pp. 319-330, 2002, IEEE Computer Society, 0-7695-1465-0. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #97 of 97 (100 per page; Change: )
|
|