Author:
Martinelli Fabio,Petrocchi Marinella
Subject
General Computer Science,Theoretical Computer Science
Reference19 articles.
1. A calculus for cryptographic protocols: The spi calculus;Abadi;Information and Computation,1999
2. Soft constraints for security;Bella;Electr. Notes Theor. Comput. Sci.,2006
3. M. Blaze, J. Feigenbaum, and J. Lacy. Decentralized trust management. In IEEE Symposium on Security and Privacy, pages 164–173. IEEE Computer Society, 1996
4. R. Dingledine and P.F. Syverson, editors. Privacy Enhancing Technologies, Second International Workshop, PET 2002, San Francisco, CA, USA, April 14-15, 2002, Revised Papers, volume 2482 of Lecture Notes in Computer Science. Springer, 2003
5. A. Jøsang, L. Gray, and M. Kinateder. Analysing topologies of transitive trust. In FAST, Tech. Rep.IIT TR-10/2003, pages 9–22, 2003
Cited by
9 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献