Author of the publication

Trust assessment: a personalized, distributed, and secure approach.

, , , and . Concurr. Comput. Pract. Exp., 24 (6): 605-617 (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Using Lotos in Workflow Specification., , and . ICEIS (3), page 364-369. (2003)Efficient Node PageRank Improvement via Link-building using Geometric Deep Learning., , , , and . ACM Trans. Knowl. Discov. Data, 17 (3): 38:1-38:22 (April 2023)Virtualization for Effective Risk-Free Network Security Assessment., , , and . Int. J. Online Eng., 10 (5): 21-28 (2014)Hidden Schema Extraction in Web Documents., , and . DNIS, volume 2822 of Lecture Notes in Computer Science, page 42-52. Springer, (2003)Direct trust assignment using social reputation and aging., , , , and . J. Ambient Intell. Humaniz. Comput., 8 (2): 167-175 (2017)A model for a web-based learning system., , , and . Inf. Syst. Frontiers, 9 (2-3): 267-282 (2007)Trust assessment: a personalized, distributed, and secure approach., , , and . Concurr. Comput. Pract. Exp., 24 (6): 605-617 (2012)Information categorization in web pages and sites., , and . Web Intell. Agent Syst., 3 (3): 183-198 (2005)The Effect of Topology on the Attachment Process in Trust Networks., , , and . IDC, volume 570 of Studies in Computational Intelligence, page 377-382. Springer, (2014)Using Twitter Data and Sentiment Analysis to Study Diseases Dynamics., , and . ITBAM, volume 9267 of Lecture Notes in Computer Science, page 16-24. Springer, (2015)