-
3
-
-
34548821880
-
A localized certificate revocation scheme for mobile ad hoc networks
-
Arboit, G., Crépeau, C., Davis, C. R., & Maheswaran, M. (2008). A localized certificate revocation scheme for mobile ad hoc networks. Ad Hoc Networks, 6 (1), 17-31.
-
(2008)
Ad Hoc Networks
, vol.6
, Issue.1
, pp. 17-31
-
-
Arboit, G.1
Crépeau, C.2
Davis, C.R.3
Maheswaran, M.4
-
4
-
-
17444428348
-
P2P M-commerce in pervasive environments
-
Avancha, S., D'Souza, P., Perich, F., Joshi, A., & Yesha, Y. (2003). P2P M-commerce in pervasive environments. SIGecom Exchange, 3 (4), 1-9.
-
(2003)
SIGecom Exchange
, vol.3
, Issue.4
, pp. 1-9
-
-
Avancha, S.1
D'Souza, P.2
Perich, F.3
Joshi, A.4
Yesha, Y.5
-
6
-
-
0034286606
-
Boosting cooperation by evolving trust
-
Birk, A. (2000). Boosting cooperation by evolving trust. Applied Artificial Intelligence, 14 (8), 769-784.
-
(2000)
Applied Artificial Intelligence
, vol.14
, Issue.8
, pp. 769-784
-
-
Birk, A.1
-
9
-
-
21144437183
-
Fuzzy referral based cooperation in social networks of agents
-
Carbó, J., Molina, J. M., & Dávila, J. (2005). Fuzzy referral based cooperation in social networks of agents. AI Commun., 18 (1), 1-13.
-
(2005)
AI Commun.
, vol.18
, Issue.1
, pp. 1-13
-
-
Carbó, J.1
Molina, J.M.2
Dávila, J.3
-
10
-
-
37549026497
-
Trust model for certificate revocation in ad hoc networks
-
Chinni, S., Thomas, J., Ghinea, G., & Shen, Z. (2008). Trust model for certificate revocation in ad hoc networks. Ad Hoc Networks, 6 (3), 441-457.
-
(2008)
Ad Hoc Networks
, vol.6
, Issue.3
, pp. 441-457
-
-
Chinni, S.1
Thomas, J.2
Ghinea, G.3
Shen, Z.4
-
12
-
-
0242641140
-
The digitization of word of mouth: Promise and challenges of online feedback mechanisms
-
Dellarocas, C. (2003). The digitization of word of mouth: Promise and challenges of online feedback mechanisms. Management Science, 49 (10), 1407-1424.
-
(2003)
Management Science
, vol.49
, Issue.10
, pp. 1407-1424
-
-
Dellarocas, C.1
-
13
-
-
29244482785
-
P2P reputation management: Probabilistic estimation vs. social networks
-
Despotovic, Z., & Aberer, K. (2006). P2P reputation management: probabilistic estimation vs. social networks. Computer Networks, 50 (4), 485-500.
-
(2006)
Computer Networks
, vol.50
, Issue.4
, pp. 485-500
-
-
Despotovic, Z.1
Aberer, K.2
-
15
-
-
84942883016
-
The socio-cognitive dynamics of trust: Does trust create trust?
-
In London: Springer
-
Falcone, R., & Castelfranchi, C. (2001). The socio-cognitive dynamics of trust: Does trust create trust? In Proceedings of the workshop on deception, fraud, and trust in agent societies held during the autonomous agents conference (pp. 55-72). London: Springer.
-
(2001)
Proceedings of the Workshop on Deception, Fraud, and Trust in Agent Societies Held during the Autonomous Agents Conference
, pp. 55-72
-
-
Falcone, R.1
Castelfranchi, C.2
-
17
-
-
0041291986
-
-
Housley, R., Polk, W., Ford, W., & Solo, D. (2002). RFC 3280'Internet X. 509 public key infrastructure certificate and certificate revocation list (CRL) profile. http://www.faqs.org/rfcs/ rfc3280.html.
-
(2002)
RFC 3280'Internet X. 509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile
-
-
Housley, R.1
Polk, W.2
Ford, W.3
Solo, D.4
-
18
-
-
57149086709
-
-
http://auctions.amazon.com (2008).
-
(2008)
-
-
-
19
-
-
57149118068
-
-
http://grouper.ieee.org/groups/802/11/index.html (2008).
-
(2008)
-
-
-
20
-
-
57149121221
-
-
http://www.bluetooth.com (2008).
-
(2008)
-
-
-
21
-
-
57149096725
-
-
http://www.ebay.com (2008).
-
(2008)
-
-
-
22
-
-
33846966283
-
An integrated trust and reputation model for open multi-agent system
-
Huynh, T. D., Jennings, N. R., & Shadbolt, N. R. (2006). An integrated trust and reputation model for open multi-agent system. Autonomous Agent and Multi Agent Systems, 13, 119-154.
-
(2006)
Autonomous Agent and Multi Agent Systems
, vol.13
, pp. 119-154
-
-
Huynh, T.D.1
Jennings, N.R.2
Shadbolt, N.R.3
-
23
-
-
33744773886
-
Simplification and analysis of transitive trust networks
-
Josang, A., Gray, E., & Kinateder, M. (2006). Simplification and analysis of transitive trust networks. Web Intelligence and Agent Systems, 4 (2), 139-161.
-
(2006)
Web Intelligence and Agent Systems
, vol.4
, Issue.2
, pp. 139-161
-
-
Josang, A.1
Gray, E.2
Kinateder, M.3
-
24
-
-
33846834126
-
A survey of trust and reputation systems for online service provision
-
Josang, A., Ismail, R., & Boyd, C. (2005). A survey of trust and reputation systems for online service provision. Decision Support System, 43 (2), 618-644.
-
(2005)
Decision Support System
, vol.43
, Issue.2
, pp. 618-644
-
-
Josang, A.1
Ismail, R.2
Boyd, C.3
-
27
-
-
34548765252
-
A transaction cost model of electronic trust: Transactional return, incentives for network security and optimal risk in the digital economy
-
Kleist, V. F. (2004). A transaction cost model of electronic trust: transactional return, incentives for network security and optimal risk in the digital economy. Electronic Commerce Research, 4 (1-2), 41-57.
-
(2004)
Electronic Commerce Research
, vol.4
, Issue.1-2
, pp. 41-57
-
-
Kleist, V.F.1
-
28
-
-
0345755816
-
Adaptive security for multi-layer ad-hoc networks
-
Kong, J., Luo, H., Xu, K., Gu, D. L., Gerla, M., & Lu, S. (2002). Adaptive security for multi-layer ad-hoc networks. Wireless Communication and Mobile Computing, 2, 533-547.
-
(2002)
Wireless Communication and Mobile Computing
, vol.2
, pp. 533-547
-
-
Kong, J.1
Luo, H.2
Xu, K.3
Gu, D.L.4
Gerla, M.5
Lu, S.6
-
30
-
-
0003839495
-
Formalizing trust as a computational concept
-
Ph.D. thesis, Department of Computing Science and Mathematics, University of Stirling
-
Marsh, S. P. (1994). Formalizing trust as a computational concept. Ph.D. thesis, Department of Computing Science and Mathematics, University of Stirling.
-
(1994)
-
-
Marsh, S.P.1
-
31
-
-
29244436370
-
Taxonomy of trust: Categorizing P2P reputation systems
-
Marti, S., & Garcia-Molina, H. (2006). Taxonomy of trust: categorizing P2P reputation systems. Computer Networks, 50 (4), 472-484.
-
(2006)
Computer Networks
, vol.50
, Issue.4
, pp. 472-484
-
-
Marti, S.1
Garcia-Molina, H.2
-
32
-
-
84856234295
-
A survey of trust use and modeling in current real systems
-
In: Song, R., Korba, L., Yee, G. (Eds.) Idea Group Publishing
-
Massa, P. (2006). A survey of trust use and modeling in current real systems. In: Song, R., Korba, L., Yee, G. (Eds.), Trust in E-services: Technologies, practices and challenges. Idea Group Publishing.
-
(2006)
Trust in E-services: Technologies, Practices and Challenges
-
-
Massa, P.1
-
33
-
-
33646491223
-
Security of a mobile transaction: A trust model
-
Misra, S. K., & Wickamasinghe, N. (2004). Security of a mobile transaction: A trust model. Electronic Commerce Research, 4 (4), 359-372.
-
(2004)
Electronic Commerce Research
, vol.4
, Issue.4
, pp. 359-372
-
-
Misra, S.K.1
Wickamasinghe, N.2
-
37
-
-
0004115865
-
-
Myers, M., Ankney, R., Malpani, A., Galperin, S., & Adams, C. (1999). RFC 2560'X. 509 Internet public key infrastructure online certificate status protocol'OCSP. http://www.faqs.org/rfcs/rfc2560.html.
-
(1999)
RFC 2560'X. 509 Internet Public Key Infrastructure Online Certificate Status Protocol'ocsp
-
-
Myers, M.1
Ankney, R.2
Malpani, A.3
Galperin, S.4
Adams, C.5
-
39
-
-
33746619662
-
Towards a holistic analysis of mobile payments: A multiple perspectives approach
-
Ondrus, J., & Pigneur, Y. (2006). Towards a holistic analysis of mobile payments: A multiple perspectives approach. Electronic Commerce Research and Applications, 5 (3), 246-257.
-
(2006)
Electronic Commerce Research and Applications
, vol.5
, Issue.3
, pp. 246-257
-
-
Ondrus, J.1
Pigneur, Y.2
-
40
-
-
85131783489
-
Technologies for trust in electronic commerce
-
Patton, M. A., & Josang, A. (2004). Technologies for trust in electronic commerce. Electronic Commerce Research, 4 (1-2), 9-21.
-
(2004)
Electronic Commerce Research
, vol.4
, Issue.1-2
, pp. 9-21
-
-
Patton, M.A.1
Josang, A.2
-
41
-
-
35248824219
-
Neighborhood-consistent transaction management for pervasive computing environments
-
In Berlin: Springer. Berlin: Springer
-
Perich, F., Joshi, A., Yesha, Y., & Finin, T. (2003). Neighborhood-consistent transaction management for pervasive computing environments. In Lecture notes in computer science: Vol. 2736. Proceedings of the 14th international conference on database and expert systems applications (DEXA 2003) (pp. 276-286). Berlin: Springer.
-
(2003)
Lecture Notes in Computer Science: Vol. 2736. Proceedings of the 14th International Conference on Database and Expert Systems Applications (DEXA 2003)
, pp. 276-286
-
-
Perich, F.1
Joshi, A.2
Yesha, Y.3
Finin, T.4
-
42
-
-
13244299169
-
In reputation we believe: Query processing in mobile ad-hoc networks
-
In Baltimore: Maryland University Press
-
Perich, F., Undercoffer, J., Kagal, L., Joshi, A., Finin, T., & Yesha, Y. (2004). In reputation we believe: Query processing in mobile ad-hoc networks. In Proceedings of the first annual international conference on mobile and ubiquitous systems: Networking and services (MOBIQUITOUS 2004) (pp. 326-334). Baltimore: Maryland University Press.
-
(2004)
Proceedings of the First Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services (MOBIQUITOUS 2004)
, pp. 326-334
-
-
Perich, F.1
Undercoffer, J.2
Kagal, L.3
Joshi, A.4
Finin, T.5
Yesha, Y.6
-
43
-
-
4544375031
-
Trust in multi-agent systems
-
Ramchurn, S. D., Huynh, D., & Jennings, N. R. (2004). Trust in multi-agent systems. Knowledge Engineering Review, 19 (1), 1-25.
-
(2004)
Knowledge Engineering Review
, vol.19
, Issue.1
, pp. 1-25
-
-
Ramchurn, S.D.1
Huynh, D.2
Jennings, N.R.3
-
44
-
-
85014332650
-
Security in embedded systems: Design challenges
-
Ravi, S., Raghunathan, A., Kocher, P., & Hattangady, S. (2004). Security in embedded systems: Design challenges. Transactions on Embedded Computing Systems, 3 (3), 461-491.
-
(2004)
Transactions on Embedded Computing Systems
, vol.3
, Issue.3
, pp. 461-491
-
-
Ravi, S.1
Raghunathan, A.2
Kocher, P.3
Hattangady, S.4
-
45
-
-
41549149784
-
Effects of reputation mechanisms on fraud. Prevention in eBay auctions
-
Thesis. Stanford University
-
Reichling, F. (2004). Effects of reputation mechanisms on fraud. Prevention in eBay auctions. Thesis. Stanford University.
-
(2004)
-
-
Reichling, F.1
-
47
-
-
0002101577
-
Reputation systems
-
Resnick, P., Zeckhauser, R., Friedman, E., & Kuwabara, K. (2000). Reputation systems. Communicatons of ACM, 43 (12), 45-48.
-
(2000)
Communicatons of ACM
, vol.43
, Issue.12
, pp. 45-48
-
-
Resnick, P.1
Zeckhauser, R.2
Friedman, E.3
Kuwabara, K.4
-
48
-
-
51149116137
-
Trust and reputation on eBay: Towards a legal framework for feedback intermediaries
-
Rietjens, B. (2006). Trust and reputation on eBay: Towards a legal framework for feedback intermediaries. Information & Communications Technology Law, 15 (1), 55-78.
-
(2006)
Information & Communications Technology Law
, vol.15
, Issue.1
, pp. 55-78
-
-
Rietjens, B.1
-
51
-
-
3543111423
-
A survey of mobile transactions
-
Serrano-Alvarado, P., Roncancio, C., & Adiba, M. (2004). A survey of mobile transactions. Distributed Parallel Databases, 16 (2), 193-230.
-
(2004)
Distributed Parallel Databases
, vol.16
, Issue.2
, pp. 193-230
-
-
Serrano-Alvarado, P.1
Roncancio, C.2
Adiba, M.3
-
52
-
-
77953838402
-
Cracking the bluetooth PIN
-
In New York: ACM
-
Shaked, Y., & Wool, A. (2005). Cracking the bluetooth PIN. In Proceedings of the 3rd international conference on mobile systems, applications, and services (MobiSys '05) (pp. 39-50). New York: ACM.
-
(2005)
Proceedings of the 3rd International Conference on Mobile Systems, Applications, and Services (MobiSys '05)
, pp. 39-50
-
-
Shaked, Y.1
Wool, A.2
-
53
-
-
29244438995
-
Cooperative peer groups in NICE
-
Sherwood, R., Lee, S., & Bhattacharjee, B. (2006). Cooperative peer groups in NICE. Computer Networks, 50 (4), 523-544.
-
(2006)
Computer Networks
, vol.50
, Issue.4
, pp. 523-544
-
-
Sherwood, R.1
Lee, S.2
Bhattacharjee, B.3
-
54
-
-
30144435160
-
Trusted P2P transactions with fuzzy reputation aggregation
-
Song, S., Hwang, K., Zhou, R., & Kwok, Y. K. (2005). Trusted P2P transactions with fuzzy reputation aggregation. IEEE Internet Computing, 9 (6), 24-34.
-
(2005)
IEEE Internet Computing
, vol.9
, Issue.6
, pp. 24-34
-
-
Song, S.1
Hwang, K.2
Zhou, R.3
Kwok, Y.K.4
-
55
-
-
0034286605
-
An outline of a trust model for electronic commerce
-
Tan, Y. H., & Thoen, W. (2000). An outline of a trust model for electronic commerce. Applied Artificial Intelligence, 14 (8), 849-862.
-
(2000)
Applied Artificial Intelligence
, vol.14
, Issue.8
, pp. 849-862
-
-
Tan, Y.H.1
Thoen, W.2
-
56
-
-
33746615620
-
Transaction management for M-commerce at a mobile terminal
-
Veijalainen, J., Terziyan, V. Y., & Tirri, H. (2006). Transaction management for M-commerce at a mobile terminal. Electronic Commerce Research and Applications, 5 (3), 229-245.
-
(2006)
Electronic Commerce Research and Applications
, vol.5
, Issue.3
, pp. 229-245
-
-
Veijalainen, J.1
Terziyan, V.Y.2
Tirri, H.3
-
57
-
-
38849090779
-
Characterizing economic and social properties of trust and reputation systems in P2P environment
-
Wang, Y. F., Hori, Y., & Sakurai, K. (2008). Characterizing economic and social properties of trust and reputation systems in P2P environment. Journal of Computer Science and Technology, 23 (1), 129-140.
-
(2008)
Journal of Computer Science and Technology
, vol.23
, Issue.1
, pp. 129-140
-
-
Wang, Y.F.1
Hori, Y.2
Sakurai, K.3
-
58
-
-
3142738238
-
PeerTrust: Supporting reputation-based trust for peer-to-peer electronic communities
-
Xiong, L., & Liu, L. (2004). PeerTrust: Supporting reputation-based trust for peer-to-peer electronic communities. IEEE Transactions on Knowledge and Data Engineering, 16 (7), 843-857.
-
(2004)
IEEE Transactions on Knowledge and Data Engineering
, vol.16
, Issue.7
, pp. 843-857
-
-
Xiong, L.1
Liu, L.2
-
59
-
-
0034309383
-
Trust management through reputation mechanisms
-
Zacharia, G., & Maes, P. (2000). Trust management through reputation mechanisms. Applied Artificial Intelligence, 14 (9), 881-907.
-
(2000)
Applied Artificial Intelligence
, vol.14
, Issue.9
, pp. 881-907
-
-
Zacharia, G.1
Maes, P.2
|