共 50 条
- [1] Trust Management in the Pervasive Computing Era [J]. IEEE SECURITY & PRIVACY, 2011, 9 (04) : 52 - 55
- [2] Probabilistic Trust Management in Pervasive Computing [J]. EUC 2008: PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING, VOL 2, WORKSHOPS, 2008, : 610 - 615
- [3] A Novel Trust Management Scheme Using Fuzzy Logic for a Pervasive Environment [J]. RECENT TRENDS IN NETWORKS AND COMMUNICATIONS, 2010, 90 : 144 - 152
- [4] Multilevel Trust Management Framework for Pervasive Computing [J]. THIRD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING: WKDD 2010, PROCEEDINGS, 2010, : 159 - 162
- [5] Research on trust management model in pervasive computing [J]. 2007 2ND INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND APPLICATIONS, VOLS 1 AND 2, 2007, : 436 - 440
- [6] Towards Secure Trust Bootstrapping in Pervasive Computing Environment [J]. 11TH IEEE HIGH ASSURANCE SYSTEMS ENGINEERING SYMPOSIUM, PROCEEDINGS, 2008, : 89 - +
- [7] Distributed Trust Based Access Control Architecture for Pervasive Computing [J]. PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON UBIQUITOUS INFORMATION TECHNOLOGIES & APPLICATIONS (ICUT 2009), 2009, : 464 - 469
- [8] An efficient key management scheme for pervasive computing [J]. ISM 2005: SEVENTH IEEE INTERNATIONAL SYMPOSIUM ON MULTIMEDIA, PROCEEDINGS, 2005, : 657 - 661
- [9] Qualitative Trust Dynamics Algebra for Trust Management in Pervasive Computing Environments [J]. AIC '09: PROCEEDINGS OF THE 9TH WSEAS INTERNATIONAL CONFERENCE ON APPLIED INFORMATICS AND COMMUNICATIONS: RECENT ADVANCES IN APPLIED INFORMAT AND COMMUNICATIONS, 2009, : 34 - +
- [10] CLIBDA: A Deniable Authentication Scheme for Pervasive Computing Environment [J]. FRONTIERS IN CYBER SECURITY, FCS 2019, 2019, 1105 : 67 - 83