1. Raja Naeem Akram and Ryan K . L. Ko. 2014 . Digital Trust - Trusted Computing and Beyond: A Position Paper. In IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications. 884–892 . https://doi.org/10.1109/TrustCom. 2014 .116 10.1109/TrustCom.2014.116 Raja Naeem Akram and Ryan K. L. Ko. 2014. Digital Trust - Trusted Computing and Beyond: A Position Paper. In IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications. 884–892. https://doi.org/10.1109/TrustCom.2014.116
2. Trust Trackers for Computation Offloading in Edge-Based IoT Networks
3. Threat-modeling-guided Trust-based Task Offloading for Resource-constrained Internet of Things
4. Jeremy Clark and Paul C. van Oorschot . 2013 . SoK: SSL and HTTPS: Revisiting Past Challenges and Evaluating Certificate Trust Model Enhancements. In IEEE Symposium on Security and Privacy. 511–525 . https://doi.org/10.1109/SP.2013.41 10.1109/SP.2013.41 Jeremy Clark and Paul C. van Oorschot. 2013. SoK: SSL and HTTPS: Revisiting Past Challenges and Evaluating Certificate Trust Model Enhancements. In IEEE Symposium on Security and Privacy. 511–525. https://doi.org/10.1109/SP.2013.41
5. Stacey Conchie . 2022. Trust In Security Contexts. CREST Security Review Summer ( 2022 ), 4–5. https://crestresearch.ac.uk/comment/trust-in-security-contexts/ Stacey Conchie. 2022. Trust In Security Contexts. CREST Security Review Summer (2022), 4–5. https://crestresearch.ac.uk/comment/trust-in-security-contexts/