Sciweavers

4111 search results - page 66 / 823
» Security, Protocols, and Trust
Sort
View
102
Voted
ISPEC
2009
Springer
15 years 7 months ago
Achieving Better Privacy Protection in Wireless Sensor Networks Using Trusted Computing
Yanjiang Yang, Robert H. Deng, Jianying Zhou, Ying...
51
Voted
EUROPKI
2007
Springer
15 years 6 months ago
An Interdomain PKI Model Based on Trust Lists
Helena Rifà-Pous, Jordi Herrera-Joancomart&...
71
Voted
PET
2004
Springer
15 years 6 months ago
Privacy-Preserving Trust Negotiations
Elisa Bertino, Elena Ferrari, Anna Cinzia Squiccia...
SP
2003
IEEE
104views Security Privacy» more  SP 2003»
15 years 5 months ago
Beyond Proof-of-Compliance: Safety and Availability Analysis in Trust Management
Ninghui Li, William H. Winsborough, John C. Mitche...
63
Voted
CCS
2001
ACM
15 years 5 months ago
Distributed credential chain discovery in trust management: extended abstract
Ninghui Li, William H. Winsborough, John C. Mitche...