An integrated scheme based on service classification in pervasive mobile services
暂无分享,去创建一个
Feng Xia | Zhikui Chen | Yang Liu | Fanyu Bu | Xiaoning Lv
[1] Shanshan Song,et al. Trusted P2P transactions with fuzzy reputation aggregation , 2005, IEEE Internet Computing.
[2] Sheng Zhong,et al. An efficient identity‐based protocol for private matching , 2011, Int. J. Commun. Syst..
[3] Thomas L. Saaty,et al. Models, Methods, Concepts & Applications of the Analytic Hierarchy Process , 2012 .
[4] Chun-I Fan,et al. Provably Secure Remote Truly Three-Factor Authentication Scheme With Privacy Protection on Biometrics , 2009, IEEE Transactions on Information Forensics and Security.
[5] Azzedine Boukerche,et al. Trust-based security for wireless ad hoc and sensor networks , 2007, Comput. Commun..
[6] Gabriele Lenzini,et al. Trust-enhanced Security in Location-based Adaptive Authentication , 2008, Electron. Notes Theor. Comput. Sci..
[7] Marco Mamei,et al. The Whereabouts Diary , 2007, LoCA.
[8] Giorgos Zacharia,et al. Trust management through reputation mechanisms , 2000, Appl. Artif. Intell..
[9] Munindar P. Singh,et al. A Social Mechanism of Reputation Management in Electronic Communities , 2000, CIA.
[10] Gaurav S. Sukhatme,et al. Connecting the Physical World with Pervasive Networks , 2002, IEEE Pervasive Comput..
[11] Stephen Hailes,et al. Supporting trust in virtual communities , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.
[12] Rui L. Aguiar,et al. Virtual Identity Framework for Telecom Infrastructures , 2008, Wirel. Pers. Commun..
[13] Franco Zambonelli,et al. Supporting location-aware services for mobile users with the whereabouts diary , 2008 .
[14] Ivan Ganchev,et al. The creation of a ubiquitous consumer wireless world through strategic ITU-T standardization , 2010, IEEE Communications Magazine.
[15] Rui L. Aguiar,et al. Pervasiveness in a competitive multi-operator environment:the daidalos project , 2007, IEEE Communications Magazine.
[16] Feng Xia,et al. A Trust Model Based on Service Classification in Mobile Services , 2010, 2010 IEEE/ACM Int'l Conference on Green Computing and Communications & Int'l Conference on Cyber, Physical and Social Computing.
[17] Jia-Lun Tsai,et al. New dynamic ID authentication scheme using smart cards , 2010, Int. J. Commun. Syst..
[18] W. Keith Edwards,et al. Intelligibility and Accountability: Human Considerations in Context-Aware Systems , 2001, Hum. Comput. Interact..
[19] Jong Hyuk Park,et al. User authentication schemes with pseudonymity for ubiquitous sensor network in NGN , 2010, Int. J. Commun. Syst..