Vis-a-Vis Verification: Social Network Identity Management Through Real World Interactions
暂无分享,去创建一个
[1] Patrick Schaumont,et al. Design methods for Security and Trust , 2007, 2007 Design, Automation & Test in Europe Conference & Exhibition.
[2] Philip R. Zimmermann,et al. The official PGP user's guide , 1996 .
[3] Tim Kindberg,et al. Distributed Systems: Concepts and Design (4th Edition) (International Computer Science) , 2005 .
[4] Stéphane Lo Presti. A Tree of Trust rooted in Extended Trusted Computing , 2007 .
[5] Professor T. Venkat Narayana Rao. Authentication Using Mobile Phone as a Security Token , 2011 .
[6] Vitaly Shmatikov,et al. The most dangerous code in the world: validating SSL certificates in non-browser software , 2012, CCS.
[7] James A. Hendler,et al. Trust Networks on the Semantic Web , 2003, WWW.
[8] John C. Mitchell,et al. Client-Side Defense Against Web-Based Identity Theft , 2004, NDSS.