-
1
-
-
0035747559
-
Managing trust in a peer-2-peer information system
-
Henrique Paques, Ling Liu, and David Grossman, editors, ACM Press
-
K. Aberer and Z. Despotovic. Managing trust in a peer-2-peer information system. In Henrique Paques, Ling Liu, and David Grossman, editors, Proceedings of the Tenth International Conference on Information and Knowledge Management (CIKM01), pages 310-317. ACM Press, 2001.
-
(2001)
Proceedings of the Tenth International Conference on Information and Knowledge Management (CIKM01)
, pp. 310-317
-
-
Aberer, K.1
Despotovic, Z.2
-
2
-
-
35248893687
-
-
E. Aivaloglou, S. Gritzalis, and C. Skianis. Trust Establishment in Ad Hoc and Sensor Networks. In J. López, editor, 1st International Workshop on Critical Information Infrastructure Security, CRITIS'06, 4347 of Lectures Notes in Computer Science, LNCS, pages 179-194, Samos, Greece, 2006. Springer.
-
E. Aivaloglou, S. Gritzalis, and C. Skianis. Trust Establishment in Ad Hoc and Sensor Networks. In J. López, editor, 1st International Workshop on Critical Information Infrastructure Security, CRITIS'06, volume 4347 of Lectures Notes in Computer Science, LNCS, pages 179-194, Samos, Greece, 2006. Springer.
-
-
-
-
4
-
-
33745855808
-
Tampering with Motes: Real-world Physical Attacks on Wireless Sensor Networks
-
York, UK, April
-
A. Becher, Z. Benenson, and M. Dornseif. Tampering with Motes: Real-world Physical Attacks on Wireless Sensor Networks. In 3rd International Conference on Security in Pervasive Computing (SPC 2006), York, UK, April 2006.
-
(2006)
3rd International Conference on Security in Pervasive Computing (SPC 2006)
-
-
Becher, A.1
Benenson, Z.2
Dornseif, M.3
-
8
-
-
84958048748
-
Compliance Checking in the Policy Maker Trust Management System
-
M. Blaze, J. Feigenbaum, and M. Strauss. Compliance Checking in the Policy Maker Trust Management System. In Financial Cryptography, pages 254-274, 1998.
-
(1998)
Financial Cryptography
, pp. 254-274
-
-
Blaze, M.1
Feigenbaum, J.2
Strauss, M.3
-
9
-
-
84947239464
-
Trust Management and Network Layer Security Protocols
-
London, UK, Springer-Verlag
-
M. Blaze, J. Ioannidis, and A. D. Keromytis. Trust Management and Network Layer Security Protocols. In Proceedings of the 7th International Workshop on Security Protocols, pages 103-118, London, UK, 2000. Springer-Verlag.
-
(2000)
Proceedings of the 7th International Workshop on Security Protocols
, pp. 103-118
-
-
Blaze, M.1
Ioannidis, J.2
Keromytis, A.D.3
-
10
-
-
0001470602
-
REFEREE: Trust Management for Web Applications
-
Y.-H. Chu, J. Feigenbaum, B. LaMacchia, P. Resnick, and M. Strauss. REFEREE: Trust Management for Web Applications. Computer Networks and ISDN Systems, 29:953-964, 1997.
-
(1997)
Computer Networks and ISDN Systems
, vol.29
, pp. 953-964
-
-
Chu, Y.-H.1
Feigenbaum, J.2
LaMacchia, B.3
Resnick, P.4
Strauss, M.5
-
11
-
-
77953066525
-
Choosing Reputable Servents in a P2P Network
-
Honolulu, Hawaii, May
-
F. Cornelli, E. Damiani, S. Paraboschi, and P. Samarati. Choosing Reputable Servents in a P2P Network. In Eleventh International World Wide Web Conference, Honolulu, Hawaii, May 2002.
-
(2002)
Eleventh International World Wide Web Conference
-
-
Cornelli, F.1
Damiani, E.2
Paraboschi, S.3
Samarati, P.4
-
12
-
-
14844315770
-
Reputation-Based Framework for High Integrity Sensor Networks
-
Washington, DC, USA
-
S. Ganeriwal and M. B. Srivastava. Reputation-Based Framework for High Integrity Sensor Networks. In 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks., pages 66-77, Washington, DC, USA, 2004.
-
(2004)
2nd ACM Workshop on Security of Ad Hoc and Sensor Networks
, pp. 66-77
-
-
Ganeriwal, S.1
Srivastava, M.B.2
-
13
-
-
24944440539
-
A Survey of Trust and Reputation Systems for Online Service Provision
-
A. Josang, R. Ismail, and C. Boyd. A Survey of Trust and Reputation Systems for Online Service Provision. Decision Support Systems, 2006.
-
(2006)
Decision Support Systems
-
-
Josang, A.1
Ismail, R.2
Boyd, C.3
-
14
-
-
27544488231
-
PET: A Personalized Trust Model with Reputation and Risk Evaluation for P2P Resource Sharing
-
Z. Liang and W. Shi. PET: A Personalized Trust Model with Reputation and Risk Evaluation for P2P Resource Sharing. In 38th Hawaii International Conference on System Sciences, 2005.
-
(2005)
38th Hawaii International Conference on System Sciences
-
-
Liang, Z.1
Shi, W.2
-
15
-
-
5044222209
-
A Dynamic Trust Model for Mobile Ad-hoc Networks
-
Suzhou, China, May
-
Z. Liu, A. W. Joy, and R. A. Thompson. A Dynamic Trust Model for Mobile Ad-hoc Networks. In 10th IEEE International Workshop on Future Trends of Distributed Computing Systems, pages 80-85, Suzhou, China, May 2004.
-
(2004)
10th IEEE International Workshop on Future Trends of Distributed Computing Systems
, pp. 80-85
-
-
Liu, Z.1
Joy, A.W.2
Thompson, R.A.3
-
19
-
-
2442519150
-
Location-centric Isolation of Misbehavior and Trust Routing in Energy-Constrained Sensor Networks
-
S. Tanachaiwiwat, P. Dave, R. Bhindwale, and A. Helmy. Location-centric Isolation of Misbehavior and Trust Routing in Energy-Constrained Sensor Networks. In IEEE COnference on Performance, Computing and Communications, pages 463-469, 2003.
-
(2003)
IEEE COnference on Performance, Computing and Communications
, pp. 463-469
-
-
Tanachaiwiwat, S.1
Dave, P.2
Bhindwale, R.3
Helmy, A.4
-
22
-
-
17144420084
-
Computing of Trust in Wireless Networks
-
Los Angeles, California, September
-
H. Zhu, F. Bao, and K. Kim. Computing of Trust in Wireless Networks. In 60th IEEE Vehicular Technology Conference, Los Angeles, California, September 2004.
-
(2004)
60th IEEE Vehicular Technology Conference
-
-
Zhu, H.1
Bao, F.2
Kim, K.3
-
23
-
-
41149110884
-
A Security Framework with Trust Management for Sensor Networks
-
Z. Yao, D. Kim, I. Lee, K. Kim, and J. Jang. A Security Framework with Trust Management for Sensor Networks. In Workshop of the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks, pages 190-198, 2005.
-
(2005)
Workshop of the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks
, pp. 190-198
-
-
Yao, Z.1
Kim, D.2
Lee, I.3
Kim, K.4
Jang, J.5
|