-
1
-
-
36348993560
-
-
Public key infrastructure
-
Alfred W. Arsenault, Sean Turner. Public key infrastructure, http://www.ietf.org/ html.charters/pkix-charter.html.
-
Arsenault, Sean Turner
-
-
Alfred, W.1
-
2
-
-
20344402499
-
Towards a Survivable Security Architecture for Ad-Hoc Networks
-
Workshop
-
T.Aura, S.Maki: Towards a Survivable Security Architecture for Ad-Hoc Networks. Security Protocols Workshop 2001: 63-73.
-
(2001)
Security Protocols
, pp. 63-73
-
-
Aura, T.1
Maki, S.2
-
3
-
-
0031641091
-
On the Structure of Delegation
-
Tuomas Aura: On the Structure of Delegation Networks. CSFW 1998: 14-26.
-
Networks
, vol.CSFW 1998
, pp. 14-26
-
-
Tuomas Aura1
-
5
-
-
84982994153
-
Distributed Access-Rights Managements with Delegations Certificates
-
T.Aura: Distributed Access-Rights Managements with Delegations Certificates. Secure Internet Programming 1999: 211-235.
-
(1999)
Secure Internet Programming
, pp. 211-235
-
-
Aura, T.1
-
6
-
-
36349030110
-
-
T.Beth, M.Borcherding and B.Klein: Valuation of Trust in Open Networks. ESORICS 1994: 3-18.
-
T.Beth, M.Borcherding and B.Klein: Valuation of Trust in Open Networks. ESORICS 1994: 3-18.
-
-
-
-
7
-
-
84957800809
-
KeyNote: Trust Management for Public-Key Infrastructures. Security ProtocolsWorkshop
-
M.Blaze, J.Feigenbaum, A.D.Keromytis: KeyNote: Trust Management for Public-Key Infrastructures. Security ProtocolsWorkshop 1998: 59-63.
-
(1998)
, pp. 59-63
-
-
Blaze, M.1
Feigenbaum, J.2
Keromytis, A.D.3
-
9
-
-
84958048748
-
Compliance Checking in the Policy Maker Trust Management System
-
M.Blaze, J.Feigenbaum and M.Strauss: Compliance Checking in the Policy Maker Trust Management System. Financial Cryptography 1998: 254-274.
-
(1998)
Financial Cryptography
, pp. 254-274
-
-
Blaze, M.1
Feigenbaum, J.2
Strauss, M.3
-
10
-
-
84958235938
-
-
M.Blaze, J.Ioannidis, A.D.Keromytis: Trust management for IPsec. TISSEC 5(2): 95-118 (2002).
-
M.Blaze, J.Ioannidis, A.D.Keromytis: Trust management for IPsec. TISSEC 5(2): 95-118 (2002).
-
-
-
-
11
-
-
36349018694
-
-
J. A. Golbeck. Computing and applying trust in web-based social networks, University of Maryland, College Park, Ph.d Dissertation 2005.
-
J. A. Golbeck. Computing and applying trust in web-based social networks, University of Maryland, College Park, Ph.d Dissertation 2005.
-
-
-
-
12
-
-
84947294004
-
-
U.Maurer: Modelling a Public-Key Infrastructure. ESORICS 1996: 325-350.
-
U.Maurer: Modelling a Public-Key Infrastructure. ESORICS 1996: 325-350.
-
-
-
-
13
-
-
5044238739
-
Core: A Collaborative Reputation Mechanism to Enforce Node Cooperation in Mobile ad-hoc Networks
-
P.Michiardi, and R.Molva. Core: A Collaborative Reputation Mechanism to Enforce Node Cooperation in Mobile ad-hoc Networks. In Proc. of CMS'02.
-
Proc. of CMS'02
-
-
Michiardi, P.1
Molva, R.2
-
14
-
-
4444276583
-
A Game Theoretical Approach to Evaluate Cooperation Enforcement Mechanisms in Mobile ad-hoc Networks
-
P.Michiardi, and R. Molva. A Game Theoretical Approach to Evaluate Cooperation Enforcement Mechanisms in Mobile ad-hoc Networks. In Proc. of WiOpt03 of the IEEE Computer Society.
-
Proc. of WiOpt03 of the IEEE Computer Society
-
-
Michiardi, P.1
Molva, R.2
-
16
-
-
0032290722
-
Resilient authentication using path in- dependence
-
December
-
M.Reiter and S.Stubblebine. Resilient authentication using path in- dependence. IEEE Transactions on computers, Vol.47, No. 12, December 1998.
-
(1998)
IEEE Transactions on computers
, vol.47
, Issue.12
-
-
Reiter, M.1
Stubblebine, S.2
-
17
-
-
39049116456
-
A Trust Evaluation Framework in Distributed Networks: Vulnerability Analysis and Defense Against Attacks
-
Barcelona, April
-
Y.Sun, Z.Han, WYu and K.Liu: A Trust Evaluation Framework in Distributed Networks: Vulnerability Analysis and Defense Against Attacks. IEEE INFOCOM'06, Barcelona, April 2006.
-
(2006)
IEEE INFOCOM'06
-
-
Sun, Y.1
Han, Z.2
WYu3
Liu, K.4
-
18
-
-
33144465932
-
Information Theoretic Framework of Trust Modeling and Evaluation for ad-hoc Networks
-
April
-
Y.Sun, W.Yu, Z.Han, and K.Liu: Information Theoretic Framework of Trust Modeling and Evaluation for ad-hoc Networks, IEEE JSAC special issue on security in wireless ad hoc networks, April, 2006.
-
(2006)
IEEE JSAC special issue on security in wireless ad hoc networks
-
-
Sun, Y.1
Yu, W.2
Han, Z.3
Liu, K.4
-
19
-
-
85026748110
-
Probabilistic Computations: Toward a Unified Measure of Complexity (Extended Abstract)
-
A.C.Yao: Probabilistic Computations: Toward a Unified Measure of Complexity (Extended Abstract) FOCS 1977: 222-227.
-
(1977)
FOCS
, pp. 222-227
-
-
Yao, A.C.1
-
20
-
-
0028675688
-
Trust-Based Navigation in Distribution Systems
-
R.Yahalom, B.Klein and T.Beth: Trust-Based Navigation in Distribution Systems. Computing Systems 7(1): 45-73, 1994.
-
(1994)
Computing Systems
, vol.7
, Issue.1
, pp. 45-73
-
-
Yahalom, R.1
Klein, B.2
Beth, T.3
-
21
-
-
46749113053
-
Pretty Good Privacy (PGP), PGP User's Guide
-
October
-
P.Zimmermann. Pretty Good Privacy (PGP), PGP User's Guide, MIT, October, 1994.
-
(1994)
MIT
-
-
Zimmermann, P.1
|