You are here

Bibliography

Export 8 results:
Author Title Type [ Year(Asc)]
Filters: Keyword is trust  [Clear All Filters]
2011
Johnson A, Syverson P, Dingledine R, Mathewson N. Trust-based Anonymous Communication: Adversary Models and Routing Algorithms. In: CCS'11 - Proceedings of the 18th ACM conference on Computer and Communications Security. CCS'11 - Proceedings of the 18th ACM conference on Computer and Communications Security. Chicago, IL, United States: ACM; 2011.
2008
Holz R, Niedermayer H, Hauck P, Carle G. Trust-Rated Authentication for Domain-Structured Distributed Systems. In: EuroPKI '08: Proceedings of the 5th European PKI workshop on Public Key Infrastructure. EuroPKI '08: Proceedings of the 5th European PKI workshop on Public Key Infrastructure. Berlin, Heidelberg: Springer-Verlag; 2008. pp. 74–88. Available from: http://www.springerlink.com/content/k6786282r5378k42/
2002
Mui L, Mohtashemi M, Halberstadt A. A Computational Model of Trust and Reputation. In: HICSS'02. Proceedings of the 35th Annual Hawaii International Conference on System Sciences. HICSS'02. Proceedings of the 35th Annual Hawaii International Conference on System Sciences. Big Island, Hawaii, USA: IEEE Computer Society; 2002. pp. 2431 - 2439 . Available from: http://dl.acm.org/citation.cfm?id=820745.821158
Buchegger S, Boudec J-YL. Performance analysis of the CONFIDANT protocol. In: MobiHoc '02: Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing. MobiHoc '02: Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing. New York, NY, USA: ACM; 2002. pp. 226–236. Available from: http://portal.acm.org/citation.cfm?id=513828#