Towards flexible credential verification in mobile ad-hoc networks
Proceedings of the second ACM international workshop on Principles of mobile computing
Belief, information acquisition, and trust in multi-agent systems: a modal logic formulation
Artificial Intelligence
Semantic constraints for trust transitivity
APCCM '05 Proceedings of the 2nd Asia-Pacific conference on Conceptual modelling - Volume 43
Trust network analysis with subjective logic
ACSC '06 Proceedings of the 29th Australasian Computer Science Conference - Volume 48
A method for access authorisation through delegation networks
ACSW Frontiers '06 Proceedings of the 2006 Australasian workshops on Grid computing and e-research - Volume 54
A survey on peer-to-peer key management for mobile ad hoc networks
ACM Computing Surveys (CSUR)
Simplification and analysis of transitive trust networks
Web Intelligence and Agent Systems
Trust-based security for wireless ad hoc and sensor networks
Computer Communications
The ghost in the browser analysis of web-based malware
HotBots'07 Proceedings of the first conference on First Workshop on Hot Topics in Understanding Botnets
Personalizing Trust in Online Auctions
Proceedings of the 2006 conference on STAIRS 2006: Proceedings of the Third Starting AI Researchers' Symposium
Max-Minimum Algorithm for Trust Transitivity in Trustworthy Networks
WI-IAT '09 Proceedings of the 2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology - Volume 03
Trust Evolution Policies for Security in Collaborative Ad Hoc Applications
Electronic Notes in Theoretical Computer Science (ENTCS)
Enforcing collaboration in peer-to-peer routing services
iTrust'03 Proceedings of the 1st international conference on Trust management
Study on trust inference and emergence of economical small-world phenomena in P2P environment
PAKDD'07 Proceedings of the 2007 international conference on Emerging technologies in knowledge discovery and data mining
Foundations of security analysis and design IV
Trust estimation using contextual fitness
KES-AMSTA'10 Proceedings of the 4th KES international conference on Agent and multi-agent systems: technologies and applications, Part I
A situation-aware computational trust model for selecting partners
Transactions on computational collective intelligence V
“Fair” authentication in pervasive computing
MADNES'05 Proceedings of the First international conference on Secure Mobile Ad-hoc Networks and Sensors
Extending trust in peer-to-peer networks
ADBIS'09 Proceedings of the 13th East European conference on Advances in Databases and Information Systems
Auditable anonymous delegation
ICISS'05 Proceedings of the First international conference on Information Systems Security
When context is better than identity: authentication by context using empirical channels
SP'11 Proceedings of the 19th international conference on Security Protocols
Collaborative service evaluation with the TwoHop trust framework
Security and Communication Networks
Trustworthiness and authentication in ubiquitous computing
Proceedings of the 10th ACM international symposium on Mobility management and wireless access
A survey of trust in social networks
ACM Computing Surveys (CSUR)
Hi-index | 0.00 |