Welcome, visitor! [ Login

Listings tagged with 'Revolut' (2)

 

[13] A Josang, “A logic for uncertain probabilities,” International Journal...

[13] A Josang, “A logic for uncertain probabilities,” International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems (S0218-4885), Vol. 9, No. 3, pp. 279-311, 2001. “A […]

No views yet

 

S. K. Liu and X. T. Liu, “A new method of elevation of confidence level of ...

S. K. Liu and X. T. Liu, “A new method of elevation of confidence level of large-scale perplexing simulation system,” Journal of System Simulation, Vol. […]

No views yet

 

R. Yahalom, B. Klein, and T. H. Beth, “Trust relationships in secure system...

R. Yahalom, B. Klein, and T. H. Beth, “Trust relationships in secure systems-A distributed authentication perspective. Proceedings 1993 IEEE Symposium on Research in Security and […]

No views yet

 

T. Beth, M. Borcherding, and B. Klein, “Valuation of trust in open networks...

T. Beth, M. Borcherding, and B. Klein, “Valuation of trust in open networks,” Proceedings 1 European Symposium on Research in Security (ESORICS), Berlin: Springer-Verlag, pp. […]

1 total views, 1 today

 

M. Blaze, J. Feigenbaum, and A. D. Keromytis, “KeyNote: trust management fo...

M. Blaze, J. Feigenbaum, and A. D. Keromytis, “KeyNote: trust management for public-key infrastructures,” B. Christianson, B. Crispo, S. William, et al., eds, Cambridge 1998 […]

No views yet

 

M. Blaze, J. Ioannidis, and A. D. Keromytis, “Experience with the keynote t...

M. Blaze, J. Ioannidis, and A. D. Keromytis, “Experience with the keynote trust management system: Applications and future directions,” iTrust, New York: Springer, pp. 284-300, […]

1 total views, 1 today

 

M. Burrows, M. Abadi, and R. M. Needham, “A logic of authentication,” The R...

M. Burrows, M. Abadi, and R. M. Needham, “A logic of authentication,” The Royal Society of London, DEC Systems Research Center, Technical Report, pp. 39, […]

1 total views, 1 today

 

T. Wen, H. Jianbin, and C. Zhong, “Research on a fuzzy logic-based subjecti...

T. Wen, H. Jianbin, and C. Zhong, “Research on a fuzzy logic-based subjective trust management model,” Computer Research and Development, Vol. 42, No. 10 pp. […]

1 total views, 1 today

 

T. Wen and C. Zhong, “Research of subjective trust management model based o...

T. Wen and C. Zhong, “Research of subjective trust management model based on the fuzzy set theory,” Journal of Software, Vol. 14, No. 8, pp. […]

1 total views, 1 today

 

S. B. Sitkin, D. M. Rousseau, R. S. Burt, and Camerer, “Trust in and betwee...

S. B. Sitkin, D. M. Rousseau, R. S. Burt, and Camerer, “Trust in and between organizations,” Academy of Management Review, Vol. 20, No. 3, pp. […]

1 total views, 1 today