A trusted measurement scheme suitable for the clients in the trusted network
暂无分享,去创建一个
Zhang Jianbiao | Gong Bei | Ye Xiaolie | Shen Changxiang | Zhang Jianbiao | Ye Xiaolie | Shen Changxiang | Gong Bei
[1] Zhenfu Cao,et al. Survey of information security , 2007, Science in China Series F: Information Sciences.
[2] Qu Yan-sheng. Information exchange model of multi control nodes in trustworthy and controllable network , 2010 .
[3] Ali Miri,et al. Combining Attribute-Based and Access Systems , 2009, 2009 International Conference on Computational Science and Engineering.
[4] Mozhgan Tavakolifard,et al. Similarity-based Techniques for Trust Management , 2010 .
[5] John S. Baras,et al. On trust models and trust evaluation metrics for ad hoc networks , 2006, IEEE Journal on Selected Areas in Communications.
[6] Brent Waters,et al. Efficient Identity-Based Encryption Without Random Oracles , 2005, EUROCRYPT.
[7] Julita Vassileva,et al. Bayesian Network Trust Model in Peer-to-Peer Networks , 2003, AP2PC.
[8] Munindar P. Singh,et al. Generalized framework for personalized recommendations in agent networks , 2012, Autonomous Agents and Multi-Agent Systems.
[9] Nicholas R. Jennings,et al. TRAVOS: Trust and Reputation in the Context of Inaccurate Information Sources , 2006, Autonomous Agents and Multi-Agent Systems.
[10] Oded Goldreich,et al. Foundations of Cryptography: Volume 1, Basic Tools , 2001 .
[11] Emiliano Lorini,et al. A logic of trust and reputation , 2010, Log. J. IGPL.