An iterative algorithm for trust and reputation management Read more about An iterative algorithm for trust and reputation management
Trust management and adversary detection for delay tolerant networks Read more about Trust management and adversary detection for delay tolerant networks
Design Principles for Secure Wireless Sensor Networks: Key Management Schemes and Malicious Attacks Read more about Design Principles for Secure Wireless Sensor Networks: Key Management Schemes and Malicious Attacks
A protocol for data availability in Mobile Ad-Hoc Networks in the presence of insider attacks Read more about A protocol for data availability in Mobile Ad-Hoc Networks in the presence of insider attacks
A belief propagation based recommender system for online services Read more about A belief propagation based recommender system for online services
Secure, intuitive and low-cost device authentication for smart grid networks Read more about Secure, intuitive and low-cost device authentication for smart grid networks
Robust reputation management using probabilistic message passing Read more about Robust reputation management using probabilistic message passing
Iterative algorithms for trust and reputation management and recommender systems Read more about Iterative algorithms for trust and reputation management and recommender systems
Application of belief propagation to trust and reputation management Read more about Application of belief propagation to trust and reputation management