-
1
-
-
24944440539
-
A survey of trust and reputation systems for online service provision
-
A. Josang, R. Ismail, and C. Boyd, "A survey of trust and reputation systems for online service provision," in Decision Support Systems, 2005.
-
(2005)
Decision Support Systems
-
-
Josang, A.1
Ismail, R.2
Boyd, C.3
-
2
-
-
33749027083
-
When trust does not compute - the role of trust in ubiquitous computing
-
M. Langheinrich, "When trust does not compute - the role of trust in ubiquitous computing," in Proceedings of UBICOMP'03, 2003.
-
(2003)
Proceedings of UBICOMP'03
-
-
Langheinrich, M.1
-
3
-
-
0029700344
-
Decentralized trust management
-
May
-
M. Blaze, J. Feigenbaum, and J. Lacy, "Decentralized trust management," in Proceedings of the 1996 IEEE Symposium on Security and Privacy, pp. 164-173, May 1996.
-
(1996)
Proceedings of the 1996 IEEE Symposium on Security and Privacy
, pp. 164-173
-
-
Blaze, M.1
Feigenbaum, J.2
Lacy, J.3
-
4
-
-
84957800809
-
KeyNote: Trust management for public-key infrastructures
-
M. Blaze, J. Feigenbaum, and A. D. Keromytis, "KeyNote: Trust management for public-key infrastructures," Lecture Notes in Computer Science, vol. 1550, pp. 59-63, 1999.
-
(1999)
Lecture Notes in Computer Science
, vol.1550
, pp. 59-63
-
-
Blaze, M.1
Feigenbaum, J.2
Keromytis, A.D.3
-
5
-
-
84947294004
-
Modelling a public-key infrastructure
-
Proceedings 1996 European Symposium on Research in Computer SecurityESORICS' 96, of
-
U. Maurer, "Modelling a public-key infrastructure," in Proceedings 1996 European Symposium on Research in Computer Security(ESORICS' 96), volume 1146 of Lecture Notes in Computer Science, pp. 325-350, 1996.
-
(1996)
Lecture Notes in Computer Science
, vol.1146
, pp. 325-350
-
-
Maurer, U.1
-
10
-
-
0035680371
-
Certificate chain discovery in SPKI/SDSI
-
D. Clarke, J.-E. Elien, C. Ellison, M. Fredette, A. Morcos, and R. L. Rivest, "Certificate chain discovery in SPKI/SDSI," Journal of Computer Security, vol. 9, no. 4, pp. 285-322, 2001.
-
(2001)
Journal of Computer Security
, vol.9
, Issue.4
, pp. 285-322
-
-
Clarke, D.1
Elien, J.-E.2
Ellison, C.3
Fredette, M.4
Morcos, A.5
Rivest, R.L.6
-
15
-
-
38549129385
-
-
R. Guha, R. Kumar, P. Raghavan, and A.T. Propagation, Propagation of trust and distrust, in Proceedings of International World Wide Web Conference, 2004.
-
R. Guha, R. Kumar, P. Raghavan, and A.T. Propagation, "Propagation of trust and distrust," in Proceedings of International World Wide Web Conference, 2004.
-
-
-
-
17
-
-
85113133621
-
CORE: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks
-
September
-
P. Michiardi and R. Molva, "CORE: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks," Communication and Multimedia Security, September 2002.
-
(2002)
Communication and Multimedia Security
-
-
Michiardi, P.1
Molva, R.2
-
18
-
-
14844335451
-
Coping with false accusations in misbehavior reputation systems for mobile ad-hoc networks,
-
S. Buchegger and J. L. Boudec, "Coping with false accusations in misbehavior reputation systems for mobile ad-hoc networks," EPFL technical report, 2003.
-
(2003)
EPFL technical report
-
-
Buchegger, S.1
Boudec, J.L.2
-
20
-
-
33144465932
-
Information theoretic framework of trust modeling and evaluation for ad hoc networks
-
April
-
Y. Sun, W. Yu, Z. Han, and K. J. Ray Liu, "Information theoretic framework of trust modeling and evaluation for ad hoc networks," IEEE JSAC special issue on security in wireless ad hoc networks, April 2006.
-
(2006)
IEEE JSAC special issue on security in wireless ad hoc networks
-
-
Sun, Y.1
Yu, W.2
Han, Z.3
Ray Liu, K.J.4
-
21
-
-
35048850522
-
On trust establishment in mobile ad-hoc networks
-
April
-
L. Eschenauer, V. Gligor, and J. S. Baras, "On trust establishment in mobile ad-hoc networks," in Security Protocols, Proc. of 10th International Workshop, Springer Lecture Notes in Computer Science (LNCS), April 2002.
-
(2002)
Security Protocols, Proc. of 10th International Workshop, Springer Lecture Notes in Computer Science (LNCS)
-
-
Eschenauer, L.1
Gligor, V.2
Baras, J.S.3
-
22
-
-
14844315770
-
-
S. Ganeriwal and M. B. Srivastava, Reputation-based framework for high integrity sensor networks, in Proceedings of ACM Security for Ad-hoc and Sensor Networks (SASN), 2004.
-
S. Ganeriwal and M. B. Srivastava, "Reputation-based framework for high integrity sensor networks," in Proceedings of ACM Security for Ad-hoc and Sensor Networks (SASN), 2004.
-
-
-
-
24
-
-
35048898290
-
Security and trust in mobile interactions: A study of users' perceptions and reasoning
-
T. Kindberg, A. Sellen, and E. Geelhoed, "Security and trust in mobile interactions: A study of users' perceptions and reasoning," in Proceedings of UBICOMP'04, 2004, pp. 196-213.
-
(2004)
Proceedings of UBICOMP'04
, pp. 196-213
-
-
Kindberg, T.1
Sellen, A.2
Geelhoed, E.3
-
25
-
-
39049164287
-
Trust evaluation in anarchy: A case study on autonomous networks
-
T. Jiang and J. S. Baras, "Trust evaluation in anarchy: A case study on autonomous networks," in Proceedings of Infocom '06, 2006.
-
(2006)
Proceedings of Infocom '06
-
-
Jiang, T.1
Baras, J.S.2
-
26
-
-
39049116456
-
A trust evaluation framework in distributed networks: Vulnerability analysis and defense against attacks
-
April
-
Y. Sun, Z. Han, W. Yu, and K. J. Ray Liu, "A trust evaluation framework in distributed networks: Vulnerability analysis and defense against attacks," in Proc. IEEE INFOCOM'06, April 2006.
-
(2006)
Proc. IEEE INFOCOM'06
-
-
Sun, Y.1
Han, Z.2
Yu, W.3
Ray Liu, K.J.4
|