Communications of the ACM
The Cathedral and the Bazaar
Beyond Fear: Thinking Sensibly about Security in an Uncertain World
Beyond Fear: Thinking Sensibly about Security in an Uncertain World
Trust network analysis with subjective logic
ACSC '06 Proceedings of the 29th Australasian Computer Science Conference - Volume 48
Communications of the ACM - The psychology of security: why do good users make bad decisions?
Optimal Trust Network Analysis with Subjective Logic
SECURWARE '08 Proceedings of the 2008 Second International Conference on Emerging Security Information, Systems and Technologies
Experiences in Hardware Trojan design and implementation
HST '09 Proceedings of the 2009 IEEE International Workshop on Hardware-Oriented Security and Trust
A Survey of Hardware Trojan Taxonomy and Detection
IEEE Design & Test
Entity Authentication and Personal Privacy in Future Cellular Systems
Entity Authentication and Personal Privacy in Future Cellular Systems
A survey of trust in internet applications
IEEE Communications Surveys & Tutorials
On the features and challenges of security and privacy in distributed internet of things
Computer Networks: The International Journal of Computer and Telecommunications Networking
Hi-index | 0.01 |
Trust is an essential component of every interaction we make. For some transactions we need very little trust, while for others we may be quite risk averse. In this paper we investigate trust in an Internet-of-Things environment. Can we trust devices? How can we quantify trust in devices?