Author of the publication

T2D: a peer to peer trust management system based on disposition to trust.

, , and . SAC, page 1472-1478. ACM, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Context Adapted Certificate Using Morph Template Signature for Pervasive Environments., , and . UCS, volume 4836 of Lecture Notes in Computer Science, page 17-32. Springer, (2007)Proximity-Based Trust Inference for Mobile Social Networking., , and . IFIPTM, volume 358 of IFIP Advances in Information and Communication Technology, page 253-264. Springer, (2011)The Chameleon: A Pervasive Grid Security Architecture., , and . ICNS, page 48. IEEE Computer Society, (2007)Coverage and adaptive scheduling algorithms for criticality management on video wireless sensor networks., , and . ICUMT, page 1-8. IEEE, (2009)Security in Distributed Collaborative Environments: Limitations and Solutions., , and . Emergent Web Intelligence, Springer, (2010)Dependability in dynamic, evolving and heterogeneous systems: the connect approach., , , , and . SERENE, page 83-88. ACM, (2010)APC: access pass certificate distrust certification model for large access in pervasive environment., , and . ICPS, page 361-370. IEEE Computer Society, (2005)T2D: a peer to peer trust management system based on disposition to trust., , and . SAC, page 1472-1478. ACM, (2010)Establishing Trust Beliefs Based on a Uniform Disposition to Trust., , , and . SITIS, page 221-228. IEEE Computer Society, (2007)Security and Trust., , , , and . SFM, volume 6659 of Lecture Notes in Computer Science, page 393-416. Springer, (2011)