Author of the publication

A reputation-based approach for choosing reliable resources in peer-to-peer networks.

, , , , and . ACM Conference on Computer and Communications Security, page 207-216. ACM, (2002)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mining Class Hierarchies from XML Data: Representation Techniques., and . Fuzzy Days, volume 33 of Advances in Soft Computing, page 385-396. Springer, (2004)Using WG-log Schemata to Represent Semistructured Data., , , and . DS-8, volume 138 of IFIP Conference Proceedings, page 331-349. Kluwer, (1999)Regulating Access To Semistructured Information on the Web., , , and . SEC, volume 175 of IFIP Conference Proceedings, page 351-360. Kluwer, (2000)SSRI online First experiences in a three-years course degree offered in e-learning at the University of Milan., , , , , and . DMS, page 65-70. Knowledge Systems Institute, (2005)Special issue: Semantics-Aware Techniques for Security.. Comput. Syst. Sci. Eng., (2004)A General Approach to Securely Querying XML., , , and . WOSIS, page 115-122. INSTICC Press, (2007)A Scalable Multi-Party Protocol for Privacy-Preserving Equality Test., , and . CAiSE Workshops, volume 148 of Lecture Notes in Business Information Processing, page 466-477. Springer, (2013)Towards securing XML Web services., , and . XML Security, page 90-96. ACM, (2002)Toward Open World and Multimodal Situation Models for Sensor-Aware Web Platforms., , , and . UCMA (2), volume 151 of Communications in Computer and Information Science, page 285-293. (2011)Fast and low cost 3d object recognition., , and . KES IIMSS, volume 226 of Studies in Computational Intelligence, page 391-399. Springer, (2009)