Citations
The paper
- Stephanos
Androutsellis-Theotokis, Diomidis Spinellis, and
Vasileios Vlachos.
The
MoR-Trust distributed trust management system: Design and simulation
results.
In Sandro Etalle, Sara Foresti, and
Pierangela Samarati, editors, Proceedings of the Second
International Workshop on Security and Trust Management (STM'06),
pages 3–15, September 2006.
Electronic Notes in Theoretical Computer Science, Volume 179, July 2007.
(doi:10.1016/j.entcs.2006.11.032)
has been cited by the following works.
- M. Bromba and
S. Wetzel.
Biometrics and authentication.
In Phishing and Countermeasures: Understanding the Increasing Problem of
Electronic Identity Theft, pages 369–460. John Wiley & Sons, Inc.,
2006.
(doi:10.1002/9780470086100.ch10)
- M. Freiberger and
S. Huq.
Network element security in optical communications equipment.
In National Fiber Optic Engineers Conference, NFOEC 2008. Optical
Society of America, 2008.
- S.-S. Chen, G. Yang,
K. Wang, and Y.-C. Zhang.
A redemption-based trust model for ad hoc networks.
Nanjing Youdian Daxue Xuebao (Ziran Kexue Ban)/Journal of Nanjing
University of Posts and Telecommunications (Natural Science),
29(4):20–25, 2009.
- P. Liu, T.F. LaPorta, and
K. Kotapati.
Cellular network security.
In Computer and Information Security Handbook, pages 183–203.
Elsevier Inc., 2009.
(doi:10.1016/B978-0-12-374354-1.00012-1)
- N. Pratas, P.N.
Anggraeni, S.A. Wardana, N.R. Prasad, A. Rodrigues, and R. Prasad.
Context-aware trust and privacy application for mobile identification system.
In IEEE Wireless Communications and Networking Conference, WCNC,
2009.
(doi:10.1109/WCNC.2009.4917639)
- S. Chen and G. Yang.
Superpathtrust for trust aggregation in unstructured peer-to-peer networks.
Yi Qi Yi Biao Xue Bao/Chinese Journal of Scientific Instrument,
31(1):223–228, 2010.
- Takayuki Nakayama.
Numerical
calculation device, numerical calculation method, and computer product.
United States Patent 7,650,302, January 2010.
Assignee: Fujitsu Limited (Kawasaki, JP)The Bank of Tokyo-Mitsubishi UFJ, Ltd.
(Tokyo, JP).
- M. Kellett, T. Tran, and
M. Li.
Trust by association: A meta-reputation system for peer-to-peer networks.
Computational Intelligence, 27(3):363–392, 2011.
(doi:10.1111/j.1467-8640.2011.00388.x)
- A. Telea and L. Voinea.
Visual software analytics for the build optimization of large-scale software
systems.
Computational Statistics, 26(4):635–654, 2011.
(doi:10.1007/s00180-011-0248-2)
- P. Karmakar and
R. Roy.
Evolution of trust and formation of preference clusters in distributed
networked structure.
Studies in Virtual Communities, Blogs, and Modern Social Networking:
Measurements, Analysis, and Investigations, pages 62–96, 2013.
(doi:10.4018/978-1-4666-4022-1.ch006)
- Adrian Perrig,
Pradeep Khosla, Arvind Seshadri, Mark Luk, and Leendert van Doorn.
Verifying
integrity and guaranteeing execution of code on untrusted computer
platform.
United States Patent 9,177,153, November 2015.
Assignee: Carnegie Mellon University (Pittsburg, PA).
Home
Unless otherwise expressly stated, all original material on this page created by Diomidis Spinellis is licensed under a Creative Commons Attribution-Share Alike 3.0 Greece License.