共 50 条
- [31] Unwanted Content Control via Trust Management in Pervasive Social Networking 2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 202 - 209
- [33] User Authentication in Social Networking Sites using Face Recognition 2012 2ND IEEE INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED AND GRID COMPUTING (PDGC), 2012, : 773 - 778
- [34] A comparison of classifiers and features for authorship authentication of social networking messages CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2017, 29 (14):
- [35] Trustworthy pervasive computing: The hard security problems SECOND IEEE ANNUAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS, PROCEEDINGS, 2004, : 117 - 121
- [36] Trust Domain Based Trustworthy Networking 2017 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY CONVERGENCE (ICTC), 2017, : 1247 - 1249
- [38] Pervasive computing and spontaneous networking PROCEEDINGS OF THE 4TH WORLD CONGRESS ON INTELLIGENT CONTROL AND AUTOMATION, VOLS 1-4, 2002, : 2411 - 2415
- [40] Pervasive authentication domains for automatic pervasive device authorization SECOND IEEE ANNUAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS, PROCEEDINGS, 2004, : 144 - 148