Author of the publication

Can Formalism Alone Provide an Answer to the Quest of a Viable Definition of Trust in the WWW Society?

, , and . e-Democracy, volume 26 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 199-208. Springer, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the Undecidability of the Panopticon Detection Problem., , , and . CSCML, volume 13301 of Lecture Notes in Computer Science, page 78-87. Springer, (2022)Exploring Trade-Offs in Partial Snapshot Implementations., , , and . SSS, volume 14310 of Lecture Notes in Computer Science, page 90-105. Springer, (2023)Randomized and Set-System Based Collusion Resistant Key Predistribution Schemes (Brief Announcement)., , and . CSCML, volume 11527 of Lecture Notes in Computer Science, page 324-327. Springer, (2019)Brief Announcement: Providing End-to-End Secure Communication in Low-Power Wide Area Networks., , and . CSCML, volume 10879 of Lecture Notes in Computer Science, page 101-104. Springer, (2018)Design, Analysis and Performance Evaluation of Group Key Establishment in Wireless Sensor Networks., , , and . WCAN@ICALP, volume 171 of Electronic Notes in Theoretical Computer Science, page 17-31. Elsevier, (2006)Cloud services cost comparison: a clustering analysis framework., , , , , and . Computing, 105 (10): 2061-2088 (October 2023)A Probabilistic Key Agreement Scheme for Sensor Networks without Key Predistribution., , , and . ICGS3/e-Democracy, volume 99 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 72-79. Springer, (2011)Trust in global computing systems as a limit property emerging from short range random interactions., , , and . ARES, page 741-748. IEEE Computer Society, (2007)A Trustworthy and Privacy Preserving Model for Online Competence Evaluation System., and . DepCoS-RELCOMEX, volume 761 of Advances in Intelligent Systems and Computing, page 338-347. Springer, (2018)How Hard Is It to Detect Surveillance? A Formal Study of Panopticons and Their Detectability Problem., , , and . Cryptogr., 6 (3): 42 (2022)