Author of the publication

XenoTrust: Event-based distributed trust management.

, , , and . DEXA Workshops, page 410-414. IEEE Computer Society, (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Pinocchio: Incentives for Honest Participation in Distributed Trust Management., , , and . iTrust, volume 2995 of Lecture Notes in Computer Science, page 63-77. Springer, (2004)CASPEr: containment-aware security for pervasive computing environments.. University of Cambridge, UK, (2006)British Library, EThOS.Information exposure control through data manipulation for ubiquitous computing., and . NSPW, page 57-64. ACM, (2004)Audio Location: Accurate Low-Cost Location Sensing., and . Pervasive, volume 3468 of Lecture Notes in Computer Science, page 1-18. Springer, (2005)Managing Trust and Reputation in the XenoServer Open Platform., , , , and . iTrust, volume 2692 of Lecture Notes in Computer Science, page 59-74. Springer, (2003)Information SeeSaw: Availability vs. Security Management in the UbiComp World., and . Secure Data Management, volume 3674 of Lecture Notes in Computer Science, page 200-216. Springer, (2005)Extending the Java Virtual Machine to Enforce Fine-Grained Security Policies in Mobile Devices., , and . ACSAC, page 233-242. IEEE Computer Society, (2007)XenoTrust: Event-based distributed trust management., , , and . DEXA Workshops, page 410-414. IEEE Computer Society, (2003)