An iterative algorithm for trust and reputation management Read more about An iterative algorithm for trust and reputation management
Trust management and adversary detection for delay tolerant networks Read more about Trust management and adversary detection for delay tolerant networks
A protocol for data availability in Mobile Ad-Hoc Networks in the presence of insider attacks Read more about A protocol for data availability in Mobile Ad-Hoc Networks in the presence of insider attacks
A belief propagation based recommender system for online services Read more about A belief propagation based recommender system for online services
Secure, intuitive and low-cost device authentication for smart grid networks Read more about Secure, intuitive and low-cost device authentication for smart grid networks
Robust reputation management using probabilistic message passing Read more about Robust reputation management using probabilistic message passing
Iterative trust and reputation management using belief propagation Read more about Iterative trust and reputation management using belief propagation
Application of belief propagation to trust and reputation management Read more about Application of belief propagation to trust and reputation management
Protecting personal genome privacy: Solutions from information security Read more about Protecting personal genome privacy: Solutions from information security
Privacy-enhancing technologies for medical tests using genomic data Read more about Privacy-enhancing technologies for medical tests using genomic data