Trust-based navigation in distributed systems
Computing Systems
Safeware: system safety and computers
Safeware: system safety and computers
Simulated social control for secure Internet commerce
NSPW '96 Proceedings of the 1996 workshop on New security paradigms
The right type of trust for distributed systems
NSPW '96 Proceedings of the 1996 workshop on New security paradigms
Valuation of Trust in Open Networks
ESORICS '94 Proceedings of the Third European Symposium on Research in Computer Security
Trust Relationships in Secure Systems-A Distributed Authentication Perspective
SP '93 Proceedings of the 1993 IEEE Symposium on Security and Privacy
Tolerating penetrations and insider attacks by requiring independent corroboration
Proceedings of the 1998 workshop on New security paradigms
Automated cross-organisational trust establishment on extranets
ITVE '01 Proceedings of the workshop on Information technology for virtual enterprises
A Distributed Light-Weight Authentication Model for Ad-hoc Networks
ICISC '01 Proceedings of the 4th International Conference Seoul on Information Security and Cryptology
Applied Information Security for m-Commerce and Digital Television Environments
EC-Web 2001 Proceedings of the Second International Conference on Electronic Commerce and Web Technologies
Attack-Resistance of Computational Trust Models
WETICE '03 Proceedings of the Twelfth International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises
Technologies for Trust in Electronic Commerce
Electronic Commerce Research
Trust enhanced ubiquitous payment without too much privacy loss
Proceedings of the 2004 ACM symposium on Applied computing
Establishing trust in pure ad-hoc networks
ACSC '04 Proceedings of the 27th Australasian conference on Computer science - Volume 26
Highly reliable trust establishment scheme in ad hoc networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Proceedings of the 10th international conference on Intelligent user interfaces
Smart dust, friend or foe?: replacing identity with configuration trust
Computer Networks: The International Journal of Computer and Telecommunications Networking - Special issue: Military communications systems and technologies
Autonomous trust construction in multi-agent systems: a graph theory methodology
Advances in Engineering Software
Dependable Dynamic Source Routing without a trusted third party
ACSC '05 Proceedings of the Twenty-eighth Australasian conference on Computer Science - Volume 38
Semantic constraints for trust transitivity
APCCM '05 Proceedings of the 2nd Asia-Pacific conference on Conceptual modelling - Volume 43
An Architectural Approach for Decentralized Trust Management
IEEE Internet Computing
Access control management in a distributed environment supporting dynamic collaboration
Proceedings of the 2005 workshop on Digital identity management
Authentification par la méfiance dans les systèmes pervasifs
UbiMob '05 Proceedings of the 2nd French-speaking conference on Mobility and ubiquity computing
Propagation Models for Trust and Distrust in Social Networks
Information Systems Frontiers
Establishing recommendation trust relationships for internetwares
ACM SIGSOFT Software Engineering Notes
Architectural support for trust models in decentralized applications
Proceedings of the 28th international conference on Software engineering
Trust Establishment In Pure Ad-hoc Networks
Wireless Personal Communications: An International Journal
Towards designing a trusted routing solution in mobile ad hoc networks
Mobile Networks and Applications
A theoretical inter-organizational trust-based security model
The Knowledge Engineering Review
A survey on peer-to-peer key management for mobile ad hoc networks
ACM Computing Surveys (CSUR)
Socio-technical defense against voice spamming
ACM Transactions on Autonomous and Adaptive Systems (TAAS)
Investigating interactions of trust and interest similarity
Decision Support Systems
Simplification and analysis of transitive trust networks
Web Intelligence and Agent Systems
A survey of trust in computer science and the Semantic Web
Web Semantics: Science, Services and Agents on the World Wide Web
A software-based trust framework for distributed industrial management systems
Journal of Systems and Software
Integrating a trust framework with a distributed certificate validation scheme for MANETs
EURASIP Journal on Wireless Communications and Networking
Trust-based security for wireless ad hoc and sensor networks
Computer Communications
International Journal of Electronic Commerce
Sahnet: a secure system for ad-hoc networking using ecc
Proceedings of the 3rd ACM workshop on QoS and security for wireless and mobile networks
Distributed Authentication of Program Integrity Verification in Wireless Sensor Networks
ACM Transactions on Information and System Security (TISSEC)
Security in mobile ad-hoc networks using soft encryption and trust-based multi-path routing
Computer Communications
Advanced Engineering Informatics
Building trust in peer-to-peer systems: a review
International Journal of Security and Networks
Service sharing with trust in pervasive environment: now it's time to break the jinx
Proceedings of the 2008 ACM symposium on Applied computing
Trusting the Trust-Model in mobile wireless ad-hoc network settings
ISP'06 Proceedings of the 5th WSEAS International Conference on Information Security and Privacy
Network service sharing infrastructure: service authentication and authorization revocation
ICCOM'05 Proceedings of the 9th WSEAS International Conference on Communications
Trust on the world wide web: a survey
Foundations and Trends in Web Science
A Semantic-Aware Ontology-Based Trust Model for Pervasive Computing Environments
ATC '08 Proceedings of the 5th international conference on Autonomic and Trusted Computing
KAF: Kalman Filter Based Adaptive Maintenance for Dependability of Composite Services
CAiSE '08 Proceedings of the 20th international conference on Advanced Information Systems Engineering
The importance of location on trust in mobile networks
WSEAS TRANSACTIONS on COMMUNICATIONS
TREPPS: A Trust-based Recommender System for Peer Production Services
Expert Systems with Applications: An International Journal
A trust-based security system for ubiquitous and pervasive computing environments
Computer Communications
Trust modelling for online transactions: a phishing scenario
Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services
Incorporating accountability into internet email
Proceedings of the 2009 ACM symposium on Applied Computing
An extended JADE-S based framework for developing secure Multi-Agent Systems
Computer Standards & Interfaces
Efficient Information Propagation in Service Routing for Next Generation Network
RSKT '09 Proceedings of the 4th International Conference on Rough Sets and Knowledge Technology
A Probabilistic Reputation Algorithm for Decentralized Multi-Agent Environments
Electronic Notes in Theoretical Computer Science (ENTCS)
StereoTrust: a group based personalized trust model
Proceedings of the 18th ACM conference on Information and knowledge management
Incorporating trust and reputation in the DSR protocol for dependable routing
Computer Communications
An agenda for the next generation gazetteer: geographic information contribution and retrieval
Proceedings of the 17th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems
Trust based security auto-configuration for smart assisted living environments
Proceedings of the 2nd ACM workshop on Assurable and usable security configuration
Case study: trust establishment in personal area networks
ISWPC'09 Proceedings of the 4th international conference on Wireless pervasive computing
Journal of Systems and Software
Trust- and Location-Based Recommendations for Tourism
OTM '09 Proceedings of the Confederated International Conferences, CoopIS, DOA, IS, and ODBASE 2009 on On the Move to Meaningful Internet Systems: Part I
Enhancing data security in ad hoc networks based on multipath routing
Journal of Parallel and Distributed Computing
Promoting cooperation among strangers to access Internet services from an ad hoc network
Pervasive and Mobile Computing
Hardware security appliances for trust
iTrust'03 Proceedings of the 1st international conference on Trust management
Methodology to bridge different domains of trust in mobile communications
iTrust'03 Proceedings of the 1st international conference on Trust management
Authentication and access control using trust collaboration in pervasive grid environments
GPC'07 Proceedings of the 2nd international conference on Advances in grid and pervasive computing
T2D: a peer to peer trust management system based on disposition to trust
Proceedings of the 2010 ACM Symposium on Applied Computing
Trust model for mobile devices in ubiquitous environment
NBiS'07 Proceedings of the 1st international conference on Network-based information systems
An efficient certificate authority for ad hoc networks
ICDCIT'07 Proceedings of the 4th international conference on Distributed computing and internet technology
RISE'06 Proceedings of the 3rd international conference on Rapid integration of software engineering techniques
A method of trust evaluation in multi-agent system
IITA'09 Proceedings of the 3rd international conference on Intelligent information technology application
Enforcing integrity of agent migration paths by distribution of trust
International Journal of Intelligent Information and Database Systems
CLUSMA: a mobile agent based clustering middleware for wireless sensor networks
Proceedings of the 7th International Conference on Frontiers of Information Technology
International Journal of Communication Networks and Distributed Systems
Security policies in distributed CSCW and workflow systems
IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans
A framework for trust enabled software asset retrieval
ATC'10 Proceedings of the 7th international conference on Autonomic and trusted computing
THWMP: trust based secure routing for wireless mesh networks
Proceedings of the 2011 International Conference on Communication, Computing & Security
A trust-based robust and efficient searching scheme for peer-to-peer networks
ICICS'10 Proceedings of the 12th international conference on Information and communications security
TrustRings in mobile wireless network settings
ISP'07 Proceedings of the 6th WSEAS international conference on Information security and privacy
GRAP: Grey risk assessment based on projection in ad hoc networks
Journal of Parallel and Distributed Computing
A context-aware reputation-based model of trust for open multi-agent environments
Canadian AI'11 Proceedings of the 24th Canadian conference on Advances in artificial intelligence
Incentivizing responsible networking via introduction-based routing
TRUST'11 Proceedings of the 4th international conference on Trust and trustworthy computing
Transactions on computational science XII
Enforcing trust in pervasive computing with trusted computing technology
CRITIS'06 Proceedings of the First international conference on Critical Information Infrastructures Security
EG-ICE'06 Proceedings of the 13th international conference on Intelligent Computing in Engineering and Architecture
CBTM: a trust model with uncertainty quantification and reasoning for pervasive computing
ISPA'05 Proceedings of the Third international conference on Parallel and Distributed Processing and Applications
Managing trust in distributed agent systems
ATC'06 Proceedings of the Third international conference on Autonomic and Trusted Computing
Toward trust management in autonomic and coordination applications
ATC'06 Proceedings of the Third international conference on Autonomic and Trusted Computing
Towards reputation-aware resource discovery in peer-to-peer networks
GCC'05 Proceedings of the 4th international conference on Grid and Cooperative Computing
Trust model architecture: defining prejudice by learning
TrustBus'06 Proceedings of the Third international conference on Trust, Privacy, and Security in Digital Business
Trust measures for competitive agents
Knowledge-Based Systems
TrustBus'05 Proceedings of the Second international conference on Trust, Privacy, and Security in Digital Business
Trust of medical devices, applications, and users in pervasive healthcare
Proceedings of the 4th International Conference on PErvasive Technologies Related to Assistive Environments
Semantic web recommender systems
EDBT'04 Proceedings of the 2004 international conference on Current Trends in Database Technology
A statistical mechanics approach to trust management in autonomic networks
International Journal of Systems, Control and Communications
Trust management issues for ad hoc and self-organized networks
WAC'05 Proceedings of the Second international IFIP conference on Autonomic Communication
Secure and privacy-aware searching in peer-to-peer networks
DPM'11 Proceedings of the 6th international conference, and 4th international conference on Data Privacy Management and Autonomous Spontaneus Security
Toward a trust management model for a configurable body sensor platform
Proceedings of the 6th International Conference on Body Area Networks
Preventing recommendation attack in trust-based recommender systems
Journal of Computer Science and Technology - Special issue on Community Analysis and Information Recommendation
A trust evolution model for P2P networks
ATC'07 Proceedings of the 4th international conference on Autonomic and Trusted Computing
Future Generation Computer Systems
A security adaptation reference monitor for wireless sensor network
ISRN Communications and Networking
Detection and Prevention of Single and Cooperative Black Hole Attacks in Mobile Ad Hoc Networks
International Journal of Business Data Communications and Networking
A social network-based trust-aware propagation model for P2P systems
Knowledge-Based Systems
Trust beyond reputation: A computational trust model based on stereotypes
Electronic Commerce Research and Applications
International Journal of Mobile Human Computer Interaction
An integrated approach for trust management based on policy, community adherence and reputation
International Journal of Ad Hoc and Ubiquitous Computing
Journal of Systems and Software
Web Intelligence and Agent Systems
Hi-index | 0.00 |