-
2
-
-
0002863367
-
Valuation of trust in open networks
-
ES-ORICS'94, 3rd European Symposium on Research in Computer Security, Springer
-
T. Beth, M. Borcherding, and B. Klein. Valuation of trust in open networks. In ES-ORICS'94, 3rd European Symposium on Research in Computer Security, LNCS 875, pages 3-18. Springer, 1994.
-
(1994)
LNCS
, vol.875
, pp. 3-18
-
-
Beth, T.1
Borcherding, M.2
Klein, B.3
-
3
-
-
0025386404
-
A logic of authentication
-
February
-
M. Burrows, M. Abadi, and R. Needham. A logic of authentication. ACM Transactions on Computer Systems, 8(1):18-36, February 1990.
-
(1990)
ACM Transactions on Computer Systems
, vol.8
, Issue.1
, pp. 18-36
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
5
-
-
0025023289
-
Reasoning About Belief in Cryptographic Protocols
-
Deborah Cooper and Teresa Lunt, editors, IEEE Computer Society
-
L. Gong, R. Needham, and R. Yahalom. Reasoning About Belief in Cryptographic Protocols. In Deborah Cooper and Teresa Lunt, editors, Proceedings 1990 IEEE Symposium on Research in Security and Privacy, pages 234-248. IEEE Computer Society, 1990.
-
(1990)
Proceedings 1990 IEEE Symposium on Research in Security and Privacy
, pp. 234-248
-
-
Gong, L.1
Needham, R.2
Yahalom, R.3
-
6
-
-
10844288659
-
Using probabilistic argumentation for key validation in public-key cryptography
-
R. Haenni. Using probabilistic argumentation for key validation in public-key cryptography. International Journal of Approximate Reasoning, 38(3):355-376, 2005.
-
(2005)
International Journal of Approximate Reasoning
, vol.38
, Issue.3
, pp. 355-376
-
-
Haenni, R.1
-
8
-
-
44049085560
-
Two-layer models for managing authenticity and trust
-
R. Song, L. Korba, and G. Yee, editors
-
R. Haenni, J. Jonczy, and R. Kohlas. Two-layer models for managing authenticity and trust. In R. Song, L. Korba, and G. Yee, editors, Trust in E-Services: Technologies, Practices and Challenges. 2006.
-
(2006)
Trust in E-Services: Technologies, Practices and Challenges
-
-
Haenni, R.1
Jonczy, J.2
Kohlas, R.3
-
9
-
-
44049107566
-
-
R. Haenni, J. Kohlas, and N. Lehmann. Probabilistic argumentation systems. In D. M. Gabbay and P. Smets, editors, Handbook of Defeasible Reasoning and Uncertainty Management Systems, 5: Algorithms for Uncertainty and Defeasible Reasoning, pages 221-288. Kluwer Academic Publishers, Dordrecht, Netherlands, 2000.
-
R. Haenni, J. Kohlas, and N. Lehmann. Probabilistic argumentation systems. In D. M. Gabbay and P. Smets, editors, Handbook of Defeasible Reasoning and Uncertainty Management Systems, volume 5: Algorithms for Uncertainty and Defeasible Reasoning, pages 221-288. Kluwer Academic Publishers, Dordrecht, Netherlands, 2000.
-
-
-
-
10
-
-
8344250960
-
ABEL: An interactive tool for probabilistic argumentative reasoning
-
Aalborg, Denmark
-
R. Haenni and N. Lehmann. ABEL: An interactive tool for probabilistic argumentative reasoning. In ECSQARU'03, 7th European Conference on Symbolic and Quantitative Approaches to Reasoning under Uncertainty, pages 588-593, Aalborg, Denmark, 2003.
-
(2003)
ECSQARU'03, 7th European Conference on Symbolic and Quantitative Approaches to Reasoning under Uncertainty
, pp. 588-593
-
-
Haenni, R.1
Lehmann, N.2
-
12
-
-
84883293902
-
Credential networks: A general model for distributed trust and authenticity management
-
A. Ghorbani and S. Marsh, editors, St. Andrews, Canada
-
J. Jonczy and R. Haenni. Credential networks: A general model for distributed trust and authenticity management. In A. Ghorbani and S. Marsh, editors, PST'05: 3rd Annual Conference on Privacy, Security and Trust, pages 101-112, St. Andrews, Canada, 2005.
-
(2005)
PST'05: 3rd Annual Conference on Privacy, Security and Trust
, pp. 101-112
-
-
Jonczy, J.1
Haenni, R.2
-
13
-
-
44049097288
-
A probabilistic trust model for GnuPG
-
Berlin, Germany
-
J. Jonczy, M.Wüthrich, and R. Haenni. A probabilistic trust model for GnuPG. In 23C3, 23rd Chaos Communication Congress, pages 61-66, Berlin, Germany, 2006.
-
(2006)
23C3, 23rd Chaos Communication Congress
, pp. 61-66
-
-
Jonczy, J.1
Wüthrich, M.2
Haenni, R.3
-
16
-
-
0003356491
-
A Mathematical Theory of Hints. An Approach to the Dempster-Shafer Theory of Evidence
-
of, Springer
-
J. Kohlas and P. A. Monney. A Mathematical Theory of Hints. An Approach to the Dempster-Shafer Theory of Evidence, volume 425 of Lecture Notes in Economics and Mathematical Systems. Springer, 1995.
-
(1995)
Lecture Notes in Economics and Mathematical Systems
, vol.425
-
-
Kohlas, J.1
Monney, P.A.2
-
17
-
-
84879862445
-
A new model for public-key authentication
-
T. Braun, G. Carle, and B. Stiller, editors, Berne, Switzerland
-
R. Kohlas, R. Haenni, and J. Jonczy. A new model for public-key authentication. In T. Braun, G. Carle, and B. Stiller, editors, KiVS'07, Kommunikation in Verteilten Systemen, pages 213-224, Berne, Switzerland, 2007.
-
(2007)
KiVS'07, Kommunikation in Verteilten Systemen
, pp. 213-224
-
-
Kohlas, R.1
Haenni, R.2
Jonczy, J.3
-
18
-
-
84957803553
-
Confidence valuation in a public-key infrastructure based on uncertain evidence
-
H. Imai and Y. Zheng, editors, PKC'2000, Third International Workshop on Practice and Theory in Public Key Cryptography, Melbourne, Australia, Springer
-
R. Kohlas and U. Maurer. Confidence valuation in a public-key infrastructure based on uncertain evidence. In H. Imai and Y. Zheng, editors, PKC'2000, Third International Workshop on Practice and Theory in Public Key Cryptography, LNCS 1751, pages 93-112, Melbourne, Australia, 2000. Springer.
-
(1751)
LNCS
, pp. 93-112
-
-
Kohlas, R.1
Maurer, U.2
-
19
-
-
85084162792
-
Attack-resistant trust metrics for public key certification
-
R. Levien and A. Aiken. Attack-resistant trust metrics for public key certification. In 7th on USENIX Security Symposium, pages 229-242, 1998.
-
(1998)
7th on USENIX Security Symposium
, pp. 229-242
-
-
Levien, R.1
Aiken, A.2
-
20
-
-
84883310169
-
Generic reliability trust model
-
A. Ghorbani and S. Marsh, editors, St. Andrews, Canada
-
G. Mahoney, W. Myrvold, and G. C. Shoja. Generic reliability trust model. In A. Ghorbani and S. Marsh, editors, PST'05: 3rd Annual Conference on Privacy, Security and Trust, pages 113-120, St. Andrews, Canada, 2005.
-
(2005)
PST'05: 3rd Annual Conference on Privacy, Security and Trust
, pp. 113-120
-
-
Mahoney, G.1
Myrvold, W.2
Shoja, G.C.3
-
21
-
-
84947294004
-
Modelling a public-key infrastructure
-
E. Bertino, H. Kurth, G. Martella, and E. Montolivo, editors, ESORICS, European Symposium on Research in Computer Security, Springer
-
U. Maurer. Modelling a public-key infrastructure. In E. Bertino, H. Kurth, G. Martella, and E. Montolivo, editors, ESORICS, European Symposium on Research in Computer Security, LNCS 1146, pages 324-350. Springer, 1996.
-
(1996)
LNCS
, vol.1146
, pp. 324-350
-
-
Maurer, U.1
-
22
-
-
0030709945
-
Path independence for authentication in large-scale systems
-
Zürich, Switzerland, Academic Press
-
M. K. Reiter and S. G. Stubblebine. Path independence for authentication in large-scale systems. In CCS'97, 4th ACM Conference on Computer and Communications Security, pages 57-66, Zürich, Switzerland, 1997. Academic Press.
-
(1997)
CCS'97, 4th ACM Conference on Computer and Communications Security
, pp. 57-66
-
-
Reiter, M.K.1
Stubblebine, S.G.2
-
24
-
-
44049094370
-
-
R. L. Rivest, A. Shamir, and L. M. Adelman. A method for obtaining digital signatures and public-key cryptosystems. Technical Report TM-82, MIT, Cambridge, USA, 1977.
-
R. L. Rivest, A. Shamir, and L. M. Adelman. A method for obtaining digital signatures and public-key cryptosystems. Technical Report TM-82, MIT, Cambridge, USA, 1977.
-
-
-
|