From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Formal Modeling and Verification of Opportunity-enabled Risk Management., , , , и . TrustCom/BigDataSE/ISPA (1), стр. 676-684. IEEE, (2015)TrustMIX: Trustworthy MIX for Energy Saving in Sensor Networks, , и . CoRR, (2007)Local ePolitics Reputation Case Study. CoRR, (2010)Towards mobile/wearable device electrosmog reduction through careful network selection., , и . AH, стр. 21. ACM, (2010)P2P with JXTA-Java pipes., , и . PPPJ, том 42 из ACM International Conference Proceeding Series, стр. 207-212. ACM, (2003)Fourth special track on Trust, Recommendations, Evidence and other Collaboration Know-how (TRECK'08): editorial message., и . SAC, стр. 1989. ACM, (2008)Trust Transfer: Encouraging Self-recommendations Without Sybil Attack., , и . iTrust, том 3477 из Lecture Notes in Computer Science, стр. 321-337. Springer, (2005)Trading Privacy for Trust., и . iTrust, том 2995 из Lecture Notes in Computer Science, стр. 93-107. Springer, (2004)On the Tradeoff among Trust, Privacy, and Cost in Incentive-Based Networks., , , и . IFIPTM, том 430 из IFIP Advances in Information and Communication Technology, стр. 205-212. Springer, (2014)WiFiOTP: Pervasive two-factor authentication using Wi-Fi SSID broadcasts., и . Kaleidoscope, стр. 1-8. IEEE, (2015)