Author of the publication

An Algebra for Trust Dilution and Trust Fusion.

, and . Formal Aspects in Security and Trust, volume 5983 of Lecture Notes in Computer Science, page 4-20. Springer, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Skin Lesion Boundary Detection with Neural Networks on iOS Devices., and . ICMHI, page 161-166. ACM, (2019)Network Protocol System Passive Testing for Fault Management: A Backward Checking Approach., , , , and . FORTE, volume 3235 of Lecture Notes in Computer Science, page 150-166. Springer, (2004)Passive Testing - A Constrained Invariant Checking Approach., , and . TestCom, volume 3502 of Lecture Notes in Computer Science, page 9-22. Springer, (2005)An EFSM-Based Intrusion Detection System for Ad Hoc Networks., , and . ATVA, volume 3707 of Lecture Notes in Computer Science, page 400-413. Springer, (2005)Skin Lesion Detection with Support Vector Machines on iOS Devices., and . MedInfo, volume 264 of Studies in Health Technology and Informatics, page 1417-1418. IOS Press, (2019)Parallel Passive Testing of System Protocols - Towards a Real-time Exhaustive Approach., and . ICN/ICONS/MCL, page 42. IEEE Computer Society, (2006)Trust and Reputation Systems. (October 2007)Conviviality measures., , , and . AAMAS, page 895-902. IFAAMAS, (2011)Evidence-Based Mobile Wound Application to Support Professionals in State-of-the-Art Chronic Wound Treatment., , , , , and . dHealth, volume 293 of Studies in Health Technology and Informatics, page 101-108. IOS Press, (2022)Towards a Decision Model Based on Trust and Security Risk Management., , , , and . AISC, volume 98 of CRPIT, page 61-69. Australian Computer Society, (2009)