-
1
Trusted secure model for data services in cloud computing
Published 2014-10-01Subjects: Get full text
Article -
2
Edge computing offloading policies and resource allocation considering system fairness in trusted environments
Published 2024-03-01Subjects: Get full text
Article -
3
-
4
Trust transitivity algorithm based on multiple influencing factors for grid environment
Published 2011-01-01Subjects: Get full text
Article -
5
-
6
Context-aware and self-adaptive trust model for pervasive computing
Published 2012-11-01Subjects: Get full text
Article -
7
Distributed trust model based on parameter modeling
Published 2013-04-01Subjects: Get full text
Article -
8
Dynamic P2P trust model based on time-window feedback mechanism
Published 2010-01-01Subjects: Get full text
Article -
9
Fuzzy trust model for wireless sensor networks with intrusion tolerance
Published 2010-01-01Subjects: Get full text
Article -
10
Dynamic trust model based on recommendation chain classification in complex network environment
Published 2015-09-01Subjects: Get full text
Article -
11
A Verifiable Discrete Trust Model (VDTM) Using Congruent Federated Learning (CFL) for Social Internet of Vehicles
Published 2024-01-01Subjects: Get full text
Article -
12
Robust multi-dimensional trust model for improving the survivability of ad hoc networks
Published 2010-01-01Subjects: Get full text
Article -
13
Collaborative filtering recommendation algorithm based on one-jump trust model
Published 2015-06-01Subjects: Get full text
Article -
14
Trust comprehensive evaluation based on the fuzzy inference theory in P2P network
Published 2009-01-01Subjects: Get full text
Article -
15
Trust model based on individual experience
Published 2008-01-01Subjects: “…trust model…”
Get full text
Article -
16
Colluding clique detector based on activity similarity in P2P trust model
Published 2009-01-01Subjects: Get full text
Article -
17
Research on trust measure and management for open distributed systems based on dynamic grouping
Published 2015-01-01Subjects: Get full text
Article -
18
Trust-driven job scheduling heuristics for computing grid
Published 2006-01-01Subjects: Get full text
Article -
19
Novel continuous identity authentication method based on mouse behavior
Published 2022-10-01Subjects: Get full text
Article -
20
Subjective trust evaluation model based on membership cloud theory
Published 2008-01-01Subjects: “…subjective trust model…”
Get full text
Article