-
1
-
-
0037341461
-
st century
-
IEEE Computer Society Press
-
st century," In IEEE Computer, IEEE Computer Society Press, pp. 25-31, 2003.
-
(2003)
IEEE Computer
, pp. 25-31
-
-
Saha, D.1
Mukherjee, A.2
-
2
-
-
77951602757
-
Deterministic trust management in pervasive computing
-
M. K. Denko, S. Tao, I. Woungang, "Deterministic trust management in pervasive computing", .Journal of Mobile Multimedia, vol.5, no.1, 2009.
-
(2009)
Journal of Mobile Multimedia
, vol.5
, Issue.1
-
-
Denko, M.K.1
Tao, S.2
Woungang, I.3
-
3
-
-
63149109584
-
Probabilistic trust management in pervasive computing
-
Dec. 17-20, Shangai, China
-
M. K. Denko, T. Sun, "Probabilistic trust management in pervasive computing," In Proc. IEEE/IFIP Int. Conference on Embedded and Ubiquitous Computing (EUC'08), pp.610-615, Dec. 17-20, Shangai, China, 2008.
-
(2008)
Proc. IEEE/IFIP Int. Conference on Embedded and Ubiquitous Computing (EUC'08)
, pp. 610-615
-
-
Denko, M.K.1
Sun, T.2
-
4
-
-
24644520728
-
Towards security and privacy for pervasive computing
-
R. Campbell, J. Al-Muhtadi, P. Naldurg, G. Sampemane, M. Mickunas. "Towards security and privacy for pervasive computing," LNCS, vol. 2609, pp. 77-82, 2003.
-
(2003)
LNCS
, vol.2609
, pp. 77-82
-
-
Campbell, R.1
Al-Muhtadi, J.2
Naldurg, P.3
Sampemane, G.4
Mickunas, M.5
-
5
-
-
56949106800
-
A trust-based system for ubiquitous and pervasive computing environments
-
A. Boukerche, Y. Ren, "A trust-based system for ubiquitous and pervasive computing environments," In Computer Communications, 31 (2008), pp. 4343-4351.
-
(2008)
Computer Communications
, vol.31
, pp. 4343-4351
-
-
Boukerche, A.1
Ren, Y.2
-
7
-
-
33750845011
-
A trust framework for pervasive computing environments
-
1618372, IEEE International Conference on Computer Systems and Applications, 2006
-
S. T. Wolfe, S. I. Ahamed, M. Zulkernine, "A trust framework for pervasive computing environments," In Proc. of IEEE Int.l Conference on Computer Systems and Applications, pp.312-319, 2006. (Pubitemid 44710968)
-
(2006)
IEEE International Conference on Computer Systems and Applications, 2006
, vol.2006
, pp. 312-319
-
-
Wolfe, S.T.1
Ahamed, S.I.2
Zulkernine, M.3
-
10
-
-
34250782069
-
A Bayesian network based trust model for improving collaboration in mobile ad hoc networks
-
C. T. Nguyen, O. Camp, S. Loiseau, "A Bayesian network based trust model for improving collaboration in mobile ad hoc networks," In Proc. IEEE International Conference on Research, Innovation and Vision for the Future, pp. 144-151, 2007.
-
(2007)
Proc. IEEE International Conference on Research, Innovation and Vision for the Future
, pp. 144-151
-
-
Nguyen, C.T.1
Camp, O.2
Loiseau, S.3
-
13
-
-
0035577649
-
Trust-based security in pervasive computing environments
-
L. Kagal, T. Finin, and A. Joshi, "Trust-based security in pervasive computing environments," IEEE Computer, vol. 34, issue 12, pp. 154-157, 2001.
-
(2001)
IEEE Computer
, vol.34
, Issue.12
, pp. 154-157
-
-
Kagal, L.1
Finin, T.2
Joshi, A.3
-
14
-
-
50249155285
-
A trust model for pervasive computing environments
-
S. Yin, I. Ray, I. Ray, "A trust model for pervasive computing environments," Proc, of CollaborateCom2006, pp. 1-6, 2006.
-
(2006)
Proc, of CollaborateCom2006
, pp. 1-6
-
-
Yin, S.1
Ray, I.2
Ray, I.3
-
15
-
-
33745913622
-
B-trust: Bayesian trust framework for pervasive computing
-
DOI 10.1007/11755593-22, Trust Management - 4th International Conference, iTrust 2006, Proceedings
-
D. Quercia, S. Hailes, L. Capra, "B-trust: Bayesian trust framework for pervasive computing," LNCS Science, vol. 3986, pp. 298-312, 2006. (Pubitemid 44045033)
-
(2006)
Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3986 LNCS
, pp. 298-312
-
-
Quercia, D.1
Hailes, S.2
Capra, L.3
-
16
-
-
39049116456
-
A trust evaluation framework in distributed networks: Vulnerability analysis and defense against attacks
-
Y. L. Sun, Z. Han, W. Yu, K. J. R. Liu, "A trust evaluation framework in distributed networks: vulnerability analysis and defense against attacks," In Proc. of INFOCOM 2006, pp. 1-13, 2006
-
(2006)
Proc. of INFOCOM 2006
, pp. 1-13
-
-
Sun, Y.L.1
Han, Z.2
Yu, W.3
Liu, K.J.R.4
|