-
2
-
-
84958048194
-
The Small World Web
-
Abiteboul, S., Vercoustre, A.-M. (eds.) ECDL 1999. Springer, Heidelberg
-
Adamic, L.A.: The Small World Web. In: Abiteboul, S., Vercoustre, A.-M. (eds.) ECDL 1999. LNCS, vol. 1696, pp. 443-852. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1696
, pp. 443-852
-
-
Adamic, L.A.1
-
3
-
-
0033539175
-
Diameter of the world-wide web
-
Albert, R., Jeong, H., Barabasi, A.: Diameter of the world-wide web. Nature 401, 130-131 (1999)
-
(1999)
Nature
, vol.401
, pp. 130-131
-
-
Albert, R.1
Jeong, H.2
Barabasi, A.3
-
4
-
-
84978975459
-
Why isn't trust transitive?
-
Lomas, M. (ed.) Security Protocols 1996. Springer, Heidelberg
-
Christianson, B., Harbison, W.: Why isn't trust transitive? In: Lomas, M. (ed.) Security Protocols 1996. LNCS, vol. 1189, pp. 171-176. Springer, Heidelberg (1997)
-
(1997)
LNCS
, vol.1189
, pp. 171-176
-
-
Christianson, B.1
Harbison, W.2
-
5
-
-
84900830868
-
Understanding and using context
-
Dey, A.K.: Understanding and using context. Personal Ubiquitous Comput. 5, 4-7 (2001)
-
(2001)
Personal Ubiquitous Comput.
, vol.5
, pp. 4-7
-
-
Dey, A.K.1
-
7
-
-
22944435846
-
Accuracy of metrics for inferring trust and reputation in semantic web-based social networks
-
Engineering Knowledge in the Age of the Semantic Web - 14th International Conference, EKAW 2004
-
Golbeck, J., Hendler, J.: Accuracy of metrics for inferring trust and reputation in semantic web-based social networks. In: Motta, E., Shadbolt, N.R., Stutt, A., Gibbins, N. (eds.) EKAW 2004. LNCS (LNAI), vol. 3257, pp. 116-131. Springer, Heidelberg (2004) (Pubitemid 41050230)
-
(2004)
Lecture Notes in Artificial Intelligence (Subseries of Lecture Notes in Computer Science)
, vol.3257
, pp. 116-131
-
-
Golbeck, J.1
Hendler, J.2
-
8
-
-
84961644448
-
Context authentication using constrained channels
-
Kindberg, T., Zhang, K., Shankar, N.: Context authentication using constrained channels. In: Proceedings of Fourth IEEEWorkshop on Mobile Computing Systems and Applications, 2002, pp. 14-21 (2002)
-
(2002)
Proceedings of Fourth IEEEWorkshop on Mobile Computing Systems and Applications, 2002
, pp. 14-21
-
-
Kindberg, T.1
Zhang, K.2
Shankar, N.3
-
10
-
-
84947251443
-
The Resurrecting Duckling: Security Issues for Ad-Hoc Wireless Networks
-
Malcolm, J.A., Christianson, B., Crispo, B., Roe, M. (eds.) Security Protocols 1999. Springer, Heidelberg
-
Stajano, F., Anderson, R.: The Resurrecting Duckling: Security Issues for Ad-Hoc Wireless Networks. In:Malcolm, J.A., Christianson, B., Crispo, B., Roe, M. (eds.) Security Protocols 1999. LNCS, vol. 1796, pp. 172-182. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1796
, pp. 172-182
-
-
Stajano, F.1
Anderson, R.2
-
11
-
-
33745156127
-
Secure communications over insecure channels based on short authenticated strings
-
Shoup, V. (ed.) CRYPTO 2005. Springer, Heidelberg
-
Vaudenay, S.: Secure communications over insecure channels based on short authenticated strings. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 309-326. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3621
, pp. 309-326
-
-
Vaudenay, S.1
-
12
-
-
38149126229
-
Multi-Channel Protocols
-
Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds.) Security Protocols 2005. Springer, Heidelberg
-
Wong, F.-L., Stajano, F.: Multi-Channel Protocols. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds.) Security Protocols 2005. LNCS, vol. 4631, pp. 112-127. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4631
, pp. 112-127
-
-
Wong, F.-L.1
Stajano, F.2
|