메뉴 건너뛰기




Volumn 2006, Issue , 2006, Pages 75-81

A conceptual architecture of a trusted mobile environment

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER ARCHITECTURE; DATABASE SYSTEMS; PUBLIC KEY CRYPTOGRAPHY; QUALITY OF SERVICE;

EID: 33845940978     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SECPERU.2006.1     Document Type: Conference Paper
Times cited : (16)

References (27)
  • 1
    • 0033357103 scopus 로고    scopus 로고
    • Securing Ad Hoc Networks
    • Nov/Dec
    • L. Zhou, Z.J. Haas, "Securing Ad Hoc Networks", IEEE Network, 13(6): 24-30, Nov/Dec 1999.
    • (1999) IEEE Network , vol.13 , Issue.6 , pp. 24-30
    • Zhou, L.1    Haas, Z.J.2
  • 3
    • 0033314753 scopus 로고    scopus 로고
    • An Overview of PKI Trust Models
    • Nov.-Dec
    • R. Perlman, "An Overview of PKI Trust Models", IEEE Network, vol.13, no.6, Nov.-Dec. 1999, pp. 38-43.
    • (1999) IEEE Network , vol.13 , Issue.6 , pp. 38-43
    • Perlman, R.1
  • 4
    • 0009481412 scopus 로고    scopus 로고
    • A Survey of Trust in Internet Applications, IEEE Communications and Survey
    • T. Grandison, M. Sloman, "A Survey of Trust in Internet Applications", IEEE Communications and Survey, Forth Quarter, 3(4), 2000, pp. 2-16.
    • (2000) Forth Quarter , vol.3 , Issue.4 , pp. 2-16
    • Grandison, T.1    Sloman, M.2
  • 5
    • 0013010709 scopus 로고    scopus 로고
    • Toward a Generic Model of Trust for Electronic Commerce
    • Y. Tan, W. Thoen, "Toward a Generic Model of Trust for Electronic Commerce, International Journal of Electronic Commerce vol.5, no.2, 1998, pp. 61-74.
    • (1998) International Journal of Electronic Commerce , vol.5 , Issue.2 , pp. 61-74
    • Tan, Y.1    Thoen, W.2
  • 7
    • 20444408160 scopus 로고    scopus 로고
    • How trustworthy is trusted computing?
    • March
    • S.J. Vaughan-Nichols, "How trustworthy is trusted computing?" Computer, Volume 36, Issue 3, March 2003.
    • (2003) Computer , vol.36 , Issue.3
    • Vaughan-Nichols, S.J.1
  • 9
    • 0033893895 scopus 로고    scopus 로고
    • E-Commerce Trust Metrics and Models
    • D.W. Manchala, "E-Commerce Trust Metrics and Models", IEEE Internet Computing, vol.4, no.2, 2000, pp. 36-44.
    • (2000) IEEE Internet Computing , vol.4 , Issue.2 , pp. 36-44
    • Manchala, D.W.1
  • 12
    • 35048838409 scopus 로고    scopus 로고
    • Methodology to Bridge Different Domains of Trust in Mobile Communications
    • Crete, Greece, May
    • Z. Yan, P. Cofta, "Methodology to Bridge Different Domains of Trust in Mobile Communications", The First International Conference on Trust Management, Crete, Greece, May 2003.
    • (2003) The First International Conference on Trust Management
    • Yan, Z.1    Cofta, P.2
  • 13
    • 33845960002 scopus 로고    scopus 로고
    • TCG TPM Specification v 1.2, 2003. https://www.trustedcomputinggroup.org/ specs/TPM/
    • TCG TPM Specification v 1.2, 2003. https://www.trustedcomputinggroup.org/ specs/TPM/
  • 14
    • 84944078503 scopus 로고    scopus 로고
    • A Reputation-based Trust Model for Peer-to-Peer E-commerce Communities
    • CEC
    • L. Xiong, L. Liu, "A Reputation-based Trust Model for Peer-to-Peer E-commerce Communities", IEEE International Conference on E-Commerce, CEC 2003, pp. 275 - 284.
    • (2003) IEEE International Conference on E-Commerce , pp. 275-284
    • Xiong, L.1    Liu, L.2
  • 20
    • 0031620256 scopus 로고    scopus 로고
    • Proc. 18th IEEE Int. Conf. Distrib. Comput. Syst
    • May
    • D. W. Manchala, "Trust Metrics, Models and Protocols for Electronic Commerce Transactions," Proc. 18th IEEE Int. Conf. Distrib. Comput. Syst., May 1998, pp. 312-321.
    • (1998) , pp. 312-321
    • Manchala, D.W.1
  • 21
    • 0032290722 scopus 로고    scopus 로고
    • Resilient Authentication Using Path Independence
    • Dec
    • M. K. Reiter, S. G. Stubblebine, "Resilient Authentication Using Path Independence," IEEE Trans. Comput., vol. 47, no. 12, Dec. 1998, pp. 1351-1362.
    • (1998) IEEE Trans. Comput , vol.47 , Issue.12 , pp. 1351-1362
    • Reiter, M.K.1    Stubblebine, S.G.2
  • 22
    • 33144465932 scopus 로고    scopus 로고
    • Information Theoretic Framework of Trust Modeling and Evaluation for Ad Hoc Networks
    • Feb
    • Y. Sun, W. Yu, Z. Han, K.J.R. Liu, "Information Theoretic Framework of Trust Modeling and Evaluation for Ad Hoc Networks", IEEE Journal on Selected Area in Communications, Vol. 24, Issue 2, Feb. 2006, pp. 305 - 317.
    • (2006) IEEE Journal on Selected Area in Communications , vol.24 , Issue.2 , pp. 305-317
    • Sun, Y.1    Yu, W.2    Han, Z.3    Liu, K.J.R.4
  • 27
    • 30144438348 scopus 로고    scopus 로고
    • Trust Collaboration in Peer-to-Peer Systems Based on Trusted Computing Platform2
    • February
    • Z. Yan, P. Zhang, "Trust Collaboration in Peer-to-Peer Systems Based on Trusted Computing Platform2, WSEAS Transactions on Information Science and Applications, Issue 2, Vol. 3, February 2006, pp. 275-282.
    • (2006) WSEAS Transactions on Information Science and Applications , vol.3 , Issue.2 , pp. 275-282
    • Yan, Z.1    Zhang, P.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.