-
2
-
-
0142249936
-
Context-aware user authentication - supporting proximity-based login in pervasive computing
-
Bardram, J.E., R.E. Kjær and M.Ø. Pederson, Context-aware user authentication - supporting proximity-based login in pervasive computing., in: Proc. of the Int. Conference on Ubiquitous Computing (Ubicomp 2003), 2003, pp. 107-123
-
(2003)
Proc. of the Int. Conference on Ubiquitous Computing (Ubicomp
, pp. 107-123
-
-
Bardram, J.E.1
Kjær, R.E.2
Pederson, M.Ø.3
-
5
-
-
50949112236
-
Controlled disclosure of context information across ubiquitous computing domains
-
Hesselman, C., H. Eertink, M. Wibbels, K. Sheikh and A. Tokmakoff, Controlled disclosure of context information across ubiquitous computing domains, in: Proc. IEEE Int. Conf. on Sensor Networks Ubiquitous, and Trustworthy Computing (STUC 2008), 2008, pp. 98-105
-
(2008)
Proc. IEEE Int. Conf. on Sensor Networks Ubiquitous, and Trustworthy Computing (STUC
, pp. 98-105
-
-
Hesselman, C.1
Eertink, H.2
Wibbels, M.3
Sheikh, K.4
Tokmakoff, A.5
-
6
-
-
35048829868
-
Modeling time-related trust
-
Proc. of the Int. Work. Grid and Cooperative Computing. (GCC 2004)
-
Huang C., Hua-Ping H., and Wang Z. Modeling time-related trust. Proc. of the Int. Work. Grid and Cooperative Computing. (GCC 2004). LNCS 3252 (2004) 382-389
-
(2004)
LNCS
, vol.3252
, pp. 382-389
-
-
Huang, C.1
Hua-Ping, H.2
Wang, Z.3
-
7
-
-
38449106182
-
Context sensitive adaptive authentication
-
Proc. of the 2nd European Conference on Smart Sensing and Context
-
Hulsebosch R.J., Bargh M.S., Lenzini G., Ebben P.W.G., and Jacob S.M. Context sensitive adaptive authentication. Proc. of the 2nd European Conference on Smart Sensing and Context. LNCS 4793 (2007) 93-109
-
(2007)
LNCS
, vol.4793
, pp. 93-109
-
-
Hulsebosch, R.J.1
Bargh, M.S.2
Lenzini, G.3
Ebben, P.W.G.4
Jacob, S.M.5
-
8
-
-
84858658369
-
Probabilistic logic under uncertainty
-
Proc. of the 13th Australian Symposium on Theory of Computing CATS 2007, ACM Int. Conf. Proc
-
Jøsang, A., Probabilistic logic under uncertainty, Proc. of the 13th Australian Symposium on Theory of Computing (CATS 2007), ACM Int. Conf. Proc. Series 65, pp. 101-110
-
Series
, vol.65
, pp. 101-110
-
-
Jøsang, A.1
-
11
-
-
63749131121
-
-
Jøsang, A., S. Pope, J. Diaz and B. Bouchon-Meunier, Dempster's rule as seen by little coloured balls (2005), manuscript, submitted to Information Fusion Journal
-
Jøsang, A., S. Pope, J. Diaz and B. Bouchon-Meunier, Dempster's rule as seen by little coloured balls (2005), manuscript, submitted to Information Fusion Journal
-
-
-
-
12
-
-
33745877934
-
Exploring different types of trust propagation
-
Proc. of the 4th Int. Conf. on Trust Management. Stølen K., Winsborough W.H., Martinelli F., and Massacci F. (Eds). (iTrust 2006)
-
Jøsang A., Pope S., and Marsh S. Exploring different types of trust propagation. In: Stølen K., Winsborough W.H., Martinelli F., and Massacci F. (Eds). Proc. of the 4th Int. Conf. on Trust Management. (iTrust 2006). LNCS 3986 (2006) 179-192
-
(2006)
LNCS
, vol.3986
, pp. 179-192
-
-
Jøsang, A.1
Pope, S.2
Marsh, S.3
-
13
-
-
39149123517
-
Trust-enhanced security in location-based adaptive authentication
-
Proc. of the ESORICS 3rd International Workshop on Security and Trust Management (STM 2007)
-
Lenzini G., Hulsebosch R.J., and Bargh M.S. Trust-enhanced security in location-based adaptive authentication. Proc. of the ESORICS 3rd International Workshop on Security and Trust Management (STM 2007). Electronic Notes in Theoretical Computer Science 197 (2008) 105-119
-
(2008)
Electronic Notes in Theoretical Computer Science
, vol.197
, pp. 105-119
-
-
Lenzini, G.1
Hulsebosch, R.J.2
Bargh, M.S.3
-
14
-
-
33749047286
-
A fuzzy trust model for e-commerce
-
Nefti, S., F. Meziane and K. Kasiran, A fuzzy trust model for e-commerce, in: Proc. of the 7th EEE Int. Conf. on E-commerce Techonolgoy (CEC 2005), 2006, pp. 401-404
-
(2005)
Proc. of the 7th EEE Int. Conf. on E-commerce Techonolgoy (CEC
, pp. 401-404
-
-
Nefti, S.1
Meziane, F.2
Kasiran, K.3
-
15
-
-
63749118097
-
-
Svensson, H. and A. Jøsang, Correlation of Intrusion Alarms with Subjective Logic, Technical Report IMM-TR-2001-14, Informatics and Mathematical Modelling, Technical University of Denmark, DTU (2001)
-
Svensson, H. and A. Jøsang, Correlation of Intrusion Alarms with Subjective Logic, Technical Report IMM-TR-2001-14, Informatics and Mathematical Modelling, Technical University of Denmark, DTU (2001)
-
-
-
-
17
-
-
0037484230
-
Sensor Fusion using Dempster-Shafer Theory ii: Static Weighting and Kalman Filter-like Dynamic Weighting
-
Wu, H., M. Siegel and S. Ablay, Sensor Fusion using Dempster-Shafer Theory ii: Static Weighting and Kalman Filter-like Dynamic Weighting, in: Proc. of 20th IEEE Instrumentation and Measurement Technology Conference (IMTC 2003), 2003, pp. 907-912
-
(2003)
Proc. of 20th IEEE Instrumentation and Measurement Technology Conference (IMTC
, pp. 907-912
-
-
Wu, H.1
Siegel, M.2
Ablay, S.3
|