-
2
-
-
84974678544
-
A social mechanism of reputation management in electronic communities
-
Online, Available
-
B. Yu and M. P. Singh, "A social mechanism of reputation management in electronic communities," in Cooperative Information Agents, 2000, pp. 154-165. [Online]. Available: citeseer.ist.psu.edu/yu00social.html
-
(2000)
Cooperative Information Agents
, pp. 154-165
-
-
Yu, B.1
Singh, M.P.2
-
3
-
-
20344371959
-
Engineering human trust in mobile system collaborations
-
L. Capra, "Engineering human trust in mobile system collaborations." in SIGSOFT FSE, 2004, pp. 107-116.
-
(2004)
SIGSOFT FSE
, pp. 107-116
-
-
Capra, L.1
-
4
-
-
58149326397
-
Trust, reciprocity and social history
-
J. Berg, J. Dickhaut, and K. McCabe, "Trust, reciprocity and social history," in Games and Economic Behavior 10, 1995, pp. 122-142.
-
(1995)
Games and Economic Behavior
, vol.10
, pp. 122-142
-
-
Berg, J.1
Dickhaut, J.2
McCabe, K.3
-
5
-
-
35048847964
-
History-based signature or how to trust anonymous documents
-
O. T. Dimitrakos, Ed, April
-
L. Bussard, R. Molva, and Y. Roudier, "History-based signature or how to trust anonymous documents." in Second International Conference on Trust Management, O. T. Dimitrakos, Ed., April 2004, pp. 78-92.
-
(2004)
Second International Conference on Trust Management
, pp. 78-92
-
-
Bussard, L.1
Molva, R.2
Roudier, Y.3
-
6
-
-
84935078039
-
Security weakness in bluetooth
-
RSA Conference
-
M. Jakobsson and S. Wetzel, "Security weakness in bluetooth," in RSA Conference (LNCS 2020, 2001, pp. 176+.
-
(2001)
LNCS
, vol.2020
-
-
Jakobsson, M.1
Wetzel, S.2
-
7
-
-
4544246596
-
Secure long term communities in ad hoc networks
-
N. Prigent, J.-P. Andreaux, C. Bidan, and O. Heen, "Secure long term communities in ad hoc networks," in 1st ACM workshop on Security in Ad hoc and Sensor Networks (SASN), 2003.
-
(2003)
1st ACM workshop on Security in Ad hoc and Sensor Networks (SASN)
-
-
Prigent, N.1
Andreaux, J.-P.2
Bidan, C.3
Heen, O.4
-
8
-
-
84874324906
-
Identity-based encryption from the weil pairing
-
CRYPTO, Springer
-
D. Boneh and M. K. Franklin, "Identity-based encryption from the weil pairing." in CRYPTO, ser. Lecture Notes in Computer Science, vol. 2139. Springer, 2001, pp. 213-229.
-
(2001)
ser. Lecture Notes in Computer Science
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.K.2
-
9
-
-
25844435663
-
A new ID-based group signature scheme from bilinear pairings
-
Information Security Applications, 4th International Workshop, WISA '03, Springer-Verlag
-
X. Chen, F. Zhang, and K. Kim, "A new ID-based group signature scheme from bilinear pairings." in Information Security Applications, 4th International Workshop - WISA '03, ser. Lecture Notes in Computer Science, vol. 2908. Springer-Verlag, 2003, pp. 585-592.
-
(2003)
ser. Lecture Notes in Computer Science
, vol.2908
, pp. 585-592
-
-
Chen, X.1
Zhang, F.2
Kim, K.3
-
10
-
-
50049083547
-
-
T. F. S. Foundation, The gnu privacy handbook, http://www.gnupg.org/gph/en/manual.html, 1999.
-
T. F. S. Foundation, "The gnu privacy handbook," http://www.gnupg.org/gph/en/manual.html, 1999.
-
-
-
-
11
-
-
33847008265
-
Enhanced reputation mechanism for mobile ad hoc networks
-
iTrust, D. Jensen, S. Poslad, and T. Dimitrakos, Eds, 2995. Springer
-
J. Liu and V. Issarny, "Enhanced reputation mechanism for mobile ad hoc networks." in iTrust, ser. Lecture Notes in Computer Science, C. D. Jensen, S. Poslad, and T. Dimitrakos, Eds., vol. 2995. Springer, 2004, pp. 48-62.
-
(2004)
ser. Lecture Notes in Computer Science
, vol.100
, pp. 48-62
-
-
Liu, J.1
Issarny, V.2
|