Author of the publication

Swift Trust in a Virtual Temporary System: A Model Based on the Dempster-Shafer Theory of Belief Functions.

, , , and . Int. J. Electron. Commer., 12 (1): 93-126 (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Sensing Users' Emotional Intelligence in Social Networks., , , , , and . IEEE Trans. Comput. Social Systems, 7 (1): 103-112 (2020)Robust Privacy-Preserving Mutual Authenticated Key Agreement Scheme in Roaming Service for Global Mobility Networks., , , and . IEEE Syst. J., 13 (2): 1454-1465 (2019)Understanding Effects of Collaborations in Developing Mobile Computing Systems: Popularity, Efficiency, and Quality., , , , , and . IEEE Access, (2019)A Lightweight Anonymous Mobile User Authentication Scheme for Smart Grid., , , , and . SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI, page 821-827. IEEE, (2018)TT-SVD: An Efficient Sparse Decision-Making Model With Two-Way Trust Recommendation in the AI-Enabled IoT Systems., , , , , , , and . IEEE Internet Things J., 8 (12): 9559-9567 (2021)Multi-Layer Network Local Community Detection Based on Influence Relation., , , , , and . IEEE Access, (2019)One-round provably secure yoking-proof for RFID applications., , , and . Concurr. Comput. Pract. Exp., (2019)Spatio-temporal deep learning method for ADHD fMRI classification., , , , , , , and . Inf. Sci., (2019)A Secure Random Key Distribution Scheme Against Node Replication Attacks in Industrial Wireless Sensor Systems., , , , , , , , and . IEEE Trans. Ind. Informatics, 16 (3): 2091-2101 (2020)Heterogeneous Information Network Representation Learning Incorporating Community Structure., , , , , and . IEEE Access, (2022)