-
1
-
-
3042654543
-
-
PhD thesis, Department of Computing, Imperial College of Science Technology and Medicine, London (UK)
-
T. Grandison. Trust specification and analysis for Internet applications. PhD thesis, Department of Computing, Imperial College of Science Technology and Medicine, London (UK), 2001.
-
(2001)
Trust Specification and Analysis for Internet Applications
-
-
Grandison, T.1
-
2
-
-
0034835799
-
Understanding trust management systems
-
Oakland, California
-
S. Weeks. Understanding trust management systems. In IEEE Symposium on Security and Privacy, Oakland, California, 2001, 94-105.
-
(2001)
IEEE Symposium on Security and Privacy
, pp. 94-105
-
-
Weeks, S.1
-
4
-
-
54649084295
-
Trust management on the World Wide Web
-
[Read 09.05.2003]
-
Khare, R., Rifkin, A. Trust management on the World Wide Web. Peer-reviewed Journal on the Internet, 3(6), 1998. http://www.firstmonday.dk/issues/issue3_6/khare/index.html, [Read 09.05.2003].
-
(1998)
Peer-reviewed Journal on the Internet
, vol.3
, Issue.6
-
-
Khare, R.1
Rifkin, A.2
-
5
-
-
35248890054
-
Trusting collaboration in global computing
-
volume 2692 of LNCS
-
C. English, W. Wagealla, P. Nixon, S.Terzis, A. McGettrick, and H. Lowe. Trusting collaboration in global computing. In First International Conference on Trust Management, volume 2692 of LNCS, 2003, 136-149.
-
(2003)
First International Conference on Trust Management
, pp. 136-149
-
-
English, C.1
Wagealla, W.2
Nixon, P.3
Terzis, S.4
McGettrick, A.5
Lowe, H.6
-
6
-
-
11144261348
-
-
PhD thesis, MIT, Cambridge, Massachusetts, December
-
L. Mui. Computational Models of Trust and Reputation: Agents, Evolutionary Games, and Social Networks. PhD thesis, MIT, Cambridge, Massachusetts, December 2002.
-
(2002)
Computational Models of Trust and Reputation: Agents, Evolutionary Games, and Social Networks
-
-
Mui, L.1
-
7
-
-
0037375973
-
Distributed pin verification scheme for improving security of mobile devices
-
J. Tang, V. Y. Terziyan, and J. Veijalainen. Distributed pin verification scheme for improving security of mobile devices. ACM MONET, Special Issue on Security in Mobile Computing Environments, 8(2), 2003, 159-175.
-
(2003)
ACM MONET, Special Issue on Security in Mobile Computing Environments
, vol.8
, Issue.2
, pp. 159-175
-
-
Tang, J.1
Terziyan, V.Y.2
Veijalainen, J.3
-
8
-
-
3042652757
-
Security and privacy of the PTP
-
Makki, K, Pissinou, N, Makki, K., Park, E. (Eds.), (Kluwer Publishers, Boston (US))
-
J. Veijalainen, A. Seleznyov, and O. Mazhelis. Security and Privacy of the PTP, In Makki, K, Pissinou, N, Makki, K., Park, E. (Eds.), Mobile and Wireless Internet: Protocols, Algorithms, and Systems (Kluwer Publishers, Boston (US), 2003), 165-190.
-
(2003)
Mobile and Wireless Internet: Protocols, Algorithms, and Systems
, pp. 165-190
-
-
Veijalainen, J.1
Seleznyov, A.2
Mazhelis, O.3
|