Cryptographic Protocol to Establish Trusted History of Interactions
暂无分享,去创建一个
Marine Minier | Stéphane Ubéda | John Mullins | Samuel Galice | M. Minier | S. Ubéda | S. Galice | John Mullins
[1] Joan Feigenbaum,et al. The Role of Trust Management in Distributed Systems Security , 2001, Secure Internet Programming.
[2] The First International Joint Conference on Autonomous Agents & Multiagent Systems, AAMAS 2002, July 15-19, 2002, Bologna, Italy, Proceedings , 2002, AAMAS.
[3] Yao-Hua Tan,et al. Trust in Cyber-societies: Integrating the Human and Artificial Perspectives , 2000, Lecture Notes in Computer Science.
[4] Rino Falcone,et al. The Socio-cognitive Dynamics of Trust: Does Trust Create Trust? , 2000, Trust in Cyber-societies.
[5] Laurent Bussard,et al. History-Based Signature or How to Trust Anonymous Documents , 2004, iTrust.
[6] Valérie Issarny,et al. Enhanced Reputation Mechanism for Mobile Ad Hoc Networks , 2004, iTrust.
[7] Xiaoyun Wang,et al. How to Break MD5 and Other Hash Functions , 2005, EUROCRYPT.
[8] Norman L. Chervany,et al. What Trust Means in E-Commerce Customer Relationships: An Interdisciplinary Conceptual Typology , 2001, Int. J. Electron. Commer..
[9] Markus Jakobsson,et al. Security Weaknesses in Bluetooth , 2001, CT-RSA.
[10] David Naccache,et al. Topics in Cryptology — CT-RSA 2001 , 2001, Lecture Notes in Computer Science.
[11] Jordi Sabater-Mir,et al. REGRET: reputation in gregarious societies , 2001, AGENTS '01.
[12] Pinar Yolum,et al. Computer and Information Sciences - ISCIS 2005, 20th International Symposium, Istanbul, Turkey, October 26-28, 2005, Proceedings , 2005, ISCIS.
[13] Christophe Bidan,et al. Secure long term communities in ad hoc networks , 2003, SASN '03.
[14] Adam Rifkin,et al. Weaving a Web of trust , 1997, World Wide Web J..
[15] Joan Feigenbaum,et al. The KeyNote Trust-Management System Version 2 , 1999, RFC.
[16] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[17] Ramon Sangüesa,et al. Extracting reputation in multi agent systems by means of social network topology , 2002, AAMAS '02.
[18] Morris Sloman,et al. A survey of trust in internet applications , 2000, IEEE Communications Surveys & Tutorials.
[19] Jan Vitek,et al. Secure Internet Programming , 1999 .
[20] Ronald Cramer,et al. Advances in Cryptology - EUROCRYPT 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings , 2005, EUROCRYPT.
[21] Sharon L. Milgram,et al. The Small World Problem , 1967 .
[22] Stéphane Ubéda,et al. Trusted Ambient community for self-securing hybrid networks , 2003 .
[23] J. Feigenbaum,et al. The KeyNote trust management system version2, IETF RFC 2704 , 1999 .
[24] Matthieu Latapy,et al. Computing Communities in Large Networks Using Random Walks , 2004, J. Graph Algorithms Appl..
[25] G. Suryanarayana,et al. A Survey of Trust Management and Resource Discovery Technologies in Peer-to-Peer Applications , 2004 .
[26] Jordi Sabater-Mir,et al. Reputation and social network analysis in multi-agent systems , 2002, AAMAS '02.
[27] Joan Feigenbaum,et al. Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[28] Diego Gambetta. Can We Trust Trust , 2000 .
[29] Licia Capra,et al. Engineering human trust in mobile system collaborations , 2004, SIGSOFT '04/FSE-12.
[30] Frank Stajano,et al. The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks , 1999, Security Protocols Workshop.
[31] Aggelos Kiayias,et al. Self Protecting Pirates and Black-Box Traitor Tracing , 2001, CRYPTO.
[32] Timothy W. Finin,et al. In reputation we believe: query processing in mobile ad-hoc networks , 2004, The First Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, 2004. MOBIQUITOUS 2004..
[33] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[34] Kwangjo Kim,et al. A New ID-based Group Signature Scheme from Bilinear Pairings , 2003, IACR Cryptol. ePrint Arch..