Filter your results
- 11
- 2
- 11
- 2
- 13
- 1
- 2
- 1
- 1
- 4
- 1
- 2
- 1
- 13
- 1
- 1
- 1
- 1
- 6
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
13 results
|
|
sorted by
|
|
Trust Management VSpringer, AICT-358, 2011, IFIP Advances in Information and Communication Technology, ⟨10.1007/978-3-642-22200-9⟩
Books
hal-01568672v1
|
||
|
A Role and Trust Access Control Model for Preserving Privacy and Image Anonymization in Social Networks13th IFIP International Conference on Trust Management (IFIPTM), Jul 2019, Copenhagen, Denmark. pp.19-27, ⟨10.1007/978-3-030-33716-2_2⟩
Conference papers
hal-03182609v1
|
||
|
Identifying Knots of Trust in Virtual Communities5th International Conference on Trust Management (TM), Jun 2011, Copenhagen, Denmark. pp.67-81, ⟨10.1007/978-3-642-22200-9_8⟩
Conference papers
hal-01568691v1
|
||
|
Evaluating Multivariate Visualizations as Multi-objective Decision Aids14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.419-436, ⟨10.1007/978-3-642-40483-2_29⟩
Conference papers
hal-01497451v1
|
||
|
Schemes for Privately Computing Trust and Reputation4th IFIP WG 11.11 International on Trust Management (TM), Jun 2010, Morioka, Japan. pp.1-16, ⟨10.1007/978-3-642-13446-3_1⟩
Conference papers
hal-01061315v1
|
||
|
The Effect of the Existence of Defective Items in Assembly OperationsIFIP International Conference on Advances in Production Management Systems (APMS), Sep 2014, Ajaccio, France. pp.449-454, ⟨10.1007/978-3-662-44733-8_56⟩
Conference papers
hal-01387287v1
|
||
|
Liability Exposure when 3D-Printed Parts Fall from the Sky12th International Conference on Critical Infrastructure Protection (ICCIP), Mar 2018, Arlington, VA, United States. pp.39-64, ⟨10.1007/978-3-030-04537-1_3⟩
Conference papers
hal-02076297v1
|
||
|
Trust Management VIIISpringer, AICT-430, 2014, IFIP Advances in Information and Communication Technology, 978-3-662-43812-1. ⟨10.1007/978-3-662-43813-8⟩
Books
hal-01381694v1
|
||
|
Simulation Analysis of Sweet Pepper Harvesting OperationsIFIP International Conference on Advances in Production Management Systems (APMS), Sep 2014, Ajaccio, France. pp.441-448, ⟨10.1007/978-3-662-44733-8_55⟩
Conference papers
hal-01387286v1
|
||
|
Anti-forensic = Suspicious: Detection of Stealthy Malware that Hides Its Network Traffic33th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), Sep 2018, Poznan, Poland. pp.216-230, ⟨10.1007/978-3-319-99828-2_16⟩
Conference papers
hal-02023723v1
|
||
|
Advanced Flow Models for Computing the Reputation of Internet Domains11th IFIP International Conference on Trust Management (TM), Jun 2017, Gothenburg, Sweden. pp.119-134, ⟨10.1007/978-3-319-59171-1_10⟩
Conference papers
hal-01651160v1
|
||
|
Reputation - from Social Perception to Internet Security9th IFIP International Conference on Trust Management (TM), May 2015, Hamburg, Germany. pp.3-10, ⟨10.1007/978-3-319-18491-3_1⟩
Conference papers
hal-01416199v1
|
||
|
Knots Maintenance for Optimal Management of Trust Relations8th IFIP International Conference on Trust Management (IFIPTM), Jul 2014, Singapore, Singapore. pp.189-204, ⟨10.1007/978-3-662-43813-8_13⟩
Conference papers
hal-01381688v1
|