Author of the publication

Pride: peer-to-peer reputation infrastructure for decentralized environments.

, and . WWW (Alternate Track Papers & Posters), page 480-481. ACM, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Patching Browsers and DNS Clients to Foil Timing Attacks., and . International Conference on Internet Computing, page 327-334. CSREA Press, (2002)A hypervisor-based system for protecting software runtime memory and persistent storage., , , , and . SpringSim, page 828-835. SCS/ACM, (2008)Trusting Routers and Relays in Ad hoc Networks., and . ICPP Workshops, page 351-358. IEEE Computer Society, (2003)Peer-to-Peer Reputations.. IPDPS, IEEE Computer Society, (2004)Defending Against Denial of Service Attacks Using Secure Name Resolution., , and . Security and Management, page 675-681. CSREA Press, (2003)P2P Reputation Management Using Distributed Identities and Decentralized Recommendation Chains., and . IEEE Trans. Knowl. Data Eng., 22 (7): 1000-1013 (2010)Denial of Service Attacks Using Internet Key Exchange Protocol., , and . CCNC, page 471-475. IEEE, (2008)On Using Reputations in Ad hoc Networks to Counter Malicious Nodes., , and . ICPADS, page 665-. IEEE Computer Society, (2004)Pride: peer-to-peer reputation infrastructure for decentralized environments., and . WWW (Alternate Track Papers & Posters), page 480-481. ACM, (2004)Mitigating routing vulnerabilities in ad hoc networks using reputations., , and . Int. J. Inf. Comput. Secur., 3 (2): 150-172 (2009)