From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Private Reputation Schemes for P2P systems., , , и . WOSIS, стр. 196-206. INSTICC Press, (2004)An Efficient Off-Line Reputation Scheme Using Articulated Certificates., , , и . WOSIS, стр. 53-62. INSTICC Press, (2004)Trust network analysis with subjective logic., , и . ACSC, том 48 из CRPIT, стр. 85-94. Australian Computer Society, (2006)TIPS: Threat Sharing Information Platform for Enhanced Security., , , , , , и . CoRR, (2024)Robust WYSIWYS: A Method for Ensuring that What You See Is What You Sign., и . AISC, том 81 из CRPIT, стр. 53-58. Australian Computer Society, (2008)Multiplication of Multinomial Subjective Opinions., и . IPMU (1), том 80 из Communications in Computer and Information Science, стр. 248-257. Springer, (2010)Cybersecurity Through Secure Software Development., , и . World Conference on Information Security Education, том 453 из IFIP Advances in Information and Communication Technology, стр. 53-63. Springer, (2015)Simulating the Effect of Reputation Systems on E-markets., , и . iTrust, том 2692 из Lecture Notes in Computer Science, стр. 179-194. Springer, (2003)The right type of trust for distributed systems.. NSPW, стр. 119-131. ACM, (1996)Generalising Bayes' theorem in subjective logic.. MFI, стр. 462-469. IEEE, (2016)