Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/stm/stm2005.bht:"
@proceedings{DBLP:conf/stm/2005, editor = {Sjouke Mauw and Val{\'{e}}rie Issarny and Cas Cremers}, title = {Proceedings of the First International Workshop on Security and Trust Management, {STM} 2005, Milan, Italy, September 15, 2005}, series = {Electronic Notes in Theoretical Computer Science}, volume = {157}, number = {3}, publisher = {Elsevier}, year = {2006}, url = {https://www.sciencedirect.com/journal/electronic-notes-in-theoretical-computer-science/vol/157/issue/3}, timestamp = {Fri, 20 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stm/2005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/CvrcekS06, author = {Daniel Cvrcek and Petr Svenda}, editor = {Sjouke Mauw and Val{\'{e}}rie Issarny and Cas Cremers}, title = {Smart Dust Security - Key Infection Revisited}, booktitle = {Proceedings of the First International Workshop on Security and Trust Management, {STM} 2005, Milan, Italy, September 15, 2005}, series = {Electronic Notes in Theoretical Computer Science}, volume = {157}, number = {3}, pages = {11--25}, publisher = {Elsevier}, year = {2005}, url = {https://doi.org/10.1016/j.entcs.2005.09.043}, doi = {10.1016/J.ENTCS.2005.09.043}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/entcs/CvrcekS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/CzenkoTDEHH06, author = {Marcin Czenko and Ha Tran and Jeroen Doumen and Sandro Etalle and Pieter H. Hartel and Jerry den Hartog}, editor = {Sjouke Mauw and Val{\'{e}}rie Issarny and Cas Cremers}, title = {Nonmonotonic Trust Management for {P2P} Applications}, booktitle = {Proceedings of the First International Workshop on Security and Trust Management, {STM} 2005, Milan, Italy, September 15, 2005}, series = {Electronic Notes in Theoretical Computer Science}, volume = {157}, number = {3}, pages = {113--130}, publisher = {Elsevier}, year = {2005}, url = {https://doi.org/10.1016/j.entcs.2005.09.037}, doi = {10.1016/J.ENTCS.2005.09.037}, timestamp = {Fri, 20 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/entcs/CzenkoTDEHH06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/DamianiVSV06, author = {Ernesto Damiani and Sabrina De Capitani di Vimercati and Pierangela Samarati and Marco Viviani}, editor = {Sjouke Mauw and Val{\'{e}}rie Issarny and Cas Cremers}, title = {A WOWA-based Aggregation Technique on Trust Values Connected to Metadata}, booktitle = {Proceedings of the First International Workshop on Security and Trust Management, {STM} 2005, Milan, Italy, September 15, 2005}, series = {Electronic Notes in Theoretical Computer Science}, volume = {157}, number = {3}, pages = {131--142}, publisher = {Elsevier}, year = {2005}, url = {https://doi.org/10.1016/j.entcs.2005.09.036}, doi = {10.1016/J.ENTCS.2005.09.036}, timestamp = {Mon, 21 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/entcs/DamianiVSV06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/Gollmann06, author = {Dieter Gollmann}, editor = {Sjouke Mauw and Val{\'{e}}rie Issarny and Cas Cremers}, title = {Why Trust is Bad for Security}, booktitle = {Proceedings of the First International Workshop on Security and Trust Management, {STM} 2005, Milan, Italy, September 15, 2005}, series = {Electronic Notes in Theoretical Computer Science}, volume = {157}, number = {3}, pages = {3--9}, publisher = {Elsevier}, year = {2005}, url = {https://doi.org/10.1016/j.entcs.2005.09.044}, doi = {10.1016/J.ENTCS.2005.09.044}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/entcs/Gollmann06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/GorrieriMP06, author = {Roberto Gorrieri and Fabio Martinelli and Marinella Petrocchi}, editor = {Sjouke Mauw and Val{\'{e}}rie Issarny and Cas Cremers}, title = {A Formalization of Credit and Responsibility Within the {GNDC} Schema}, booktitle = {Proceedings of the First International Workshop on Security and Trust Management, {STM} 2005, Milan, Italy, September 15, 2005}, series = {Electronic Notes in Theoretical Computer Science}, volume = {157}, number = {3}, pages = {61--78}, publisher = {Elsevier}, year = {2005}, url = {https://doi.org/10.1016/j.entcs.2005.09.040}, doi = {10.1016/J.ENTCS.2005.09.040}, timestamp = {Fri, 20 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/entcs/GorrieriMP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/GrayJOWSC06, author = {Elizabeth Gray and Christian Damsgaard Jensen and Paul O'Connell and Stefan Weber and Jean{-}Marc Seigneur and Yong Chen}, editor = {Sjouke Mauw and Val{\'{e}}rie Issarny and Cas Cremers}, title = {Trust Evolution Policies for Security in Collaborative Ad Hoc Applications}, booktitle = {Proceedings of the First International Workshop on Security and Trust Management, {STM} 2005, Milan, Italy, September 15, 2005}, series = {Electronic Notes in Theoretical Computer Science}, volume = {157}, number = {3}, pages = {95--111}, publisher = {Elsevier}, year = {2005}, url = {https://doi.org/10.1016/j.entcs.2005.09.038}, doi = {10.1016/J.ENTCS.2005.09.038}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/entcs/GrayJOWSC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/MauwIC06, author = {Sjouke Mauw and Val{\'{e}}rie Issarny and Cas Cremers}, editor = {Sjouke Mauw and Val{\'{e}}rie Issarny and Cas Cremers}, title = {Preface}, booktitle = {Proceedings of the First International Workshop on Security and Trust Management, {STM} 2005, Milan, Italy, September 15, 2005}, series = {Electronic Notes in Theoretical Computer Science}, volume = {157}, number = {3}, pages = {1--2}, publisher = {Elsevier}, year = {2005}, url = {https://doi.org/10.1016/j.entcs.2005.09.045}, doi = {10.1016/J.ENTCS.2005.09.045}, timestamp = {Fri, 20 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/entcs/MauwIC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/McDonaldY06, author = {Jeffrey Todd McDonald and Alec Yasinsac}, editor = {Sjouke Mauw and Val{\'{e}}rie Issarny and Cas Cremers}, title = {Application Security Models for Mobile Agent Systems}, booktitle = {Proceedings of the First International Workshop on Security and Trust Management, {STM} 2005, Milan, Italy, September 15, 2005}, series = {Electronic Notes in Theoretical Computer Science}, volume = {157}, number = {3}, pages = {43--59}, publisher = {Elsevier}, year = {2005}, url = {https://doi.org/10.1016/j.entcs.2005.09.041}, doi = {10.1016/J.ENTCS.2005.09.041}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/entcs/McDonaldY06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/OrzanV06, author = {Simona Orzan and Erik P. de Vink}, editor = {Sjouke Mauw and Val{\'{e}}rie Issarny and Cas Cremers}, title = {Multiparty Contract Signing Over a Reliable Network}, booktitle = {Proceedings of the First International Workshop on Security and Trust Management, {STM} 2005, Milan, Italy, September 15, 2005}, series = {Electronic Notes in Theoretical Computer Science}, volume = {157}, number = {3}, pages = {27--41}, publisher = {Elsevier}, year = {2005}, url = {https://doi.org/10.1016/j.entcs.2005.09.042}, doi = {10.1016/J.ENTCS.2005.09.042}, timestamp = {Fri, 20 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/entcs/OrzanV06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/QuillinanF06, author = {Thomas B. Quillinan and Simon N. Foley}, editor = {Sjouke Mauw and Val{\'{e}}rie Issarny and Cas Cremers}, title = {Synchronisation in Trust Management Using Push Authorisation}, booktitle = {Proceedings of the First International Workshop on Security and Trust Management, {STM} 2005, Milan, Italy, September 15, 2005}, series = {Electronic Notes in Theoretical Computer Science}, volume = {157}, number = {3}, pages = {143--158}, publisher = {Elsevier}, year = {2005}, url = {https://doi.org/10.1016/j.entcs.2005.09.035}, doi = {10.1016/J.ENTCS.2005.09.035}, timestamp = {Fri, 20 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/entcs/QuillinanF06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/Schmidt-Samoa06a, author = {Katja Schmidt{-}Samoa}, editor = {Sjouke Mauw and Val{\'{e}}rie Issarny and Cas Cremers}, title = {A New Rabin-type Trapdoor Permutation Equivalent to Factoring}, booktitle = {Proceedings of the First International Workshop on Security and Trust Management, {STM} 2005, Milan, Italy, September 15, 2005}, series = {Electronic Notes in Theoretical Computer Science}, volume = {157}, number = {3}, pages = {79--94}, publisher = {Elsevier}, year = {2005}, url = {https://doi.org/10.1016/j.entcs.2005.09.039}, doi = {10.1016/J.ENTCS.2005.09.039}, timestamp = {Fri, 20 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/entcs/Schmidt-Samoa06a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.