rorizontl integrtion of ess tehnologies to networks nd servies should e ompnied y some kind of onvergene of uthentiE tion tehnologiesF he missing link for the federtion of user ide...
We address the learning of trust based on past observations and context information. We argue that from the truster's point of view trust is best expressed as one of several ...
In a multi-hop mobile ad hoc network (MANET) mobile nodes communicate with each other forming a cooperative radio network. Security remains a major challenge for these networks du...
One of the most fundamental problems in computer security is protecting sensitive digital information from unauthorized disclosure. There are a number of challenges, such as spywa...
Most trust models in Peer-to-Peer (P2P) systems are identity based, which means that in order for one peer to trust another, it needs to know the other peer's identity. Hence,...
Li Lu, Jinsong Han, Yunhao Liu, Lei Hu, Jinpeng Hu...