—Receiver-location privacy is an important security requirement in privacy-preserving Vehicular Ad hoc Networks (VANETs), yet the unavailable receiver’s location information ma...
Bandura’s social cognitive construct “perceived selfefficacy” has been used widely to understand individual behavior as a function of domain-specific beliefs about personal ...
In this paper, we design recommender systems for weblogs based on the link structure among them. We propose algorithms based on refined random walks and spectral methods. First, w...
: We propose and analyze a class of trust management protocols for encounter-based routing in delay tolerant networks (DTNs). The underlying idea is to incorporate trust evaluation...
—A co-offending network is a network of offenders who have committed crimes together. Recently different researches have shown that there is a fairly strong concept of network am...