Jean-Marc Seigneur
Cited by
Cited by
Using trust for secure collaboration in uncertain environments
V Cahill, E Gray, JM Seigneur, CD Jensen, Y Chen, B Shand, N Dimmock, ...
IEEE pervasive computing 2 (3), 52-61, 2003
Trust propagation in small worlds
E Gray, JM Seigneur, Y Chen, C Jensen
International conference on trust management, 239-254, 2003
Computing with social trust
J Golbeck
Springer Science & Business Media, 2008
A survey of user-centric identity management technologies
T El Maliki, JM Seigneur
The International Conference on Emerging Security Information, Systems, and …, 2007
Trading privacy for trust
JM Seigneur, CD Jensen
International Conference on Trust Management, 93-107, 2004
Extracting trust from domain analysis: A case study on the wikipedia project
P Dondio, S Barrett, S Weber, JM Seigneur
International Conference on Autonomic and Trusted Computing, 362-373, 2006
Virtual currency and reputation-based cooperation incentives in user-centric networks
A Bogliolo, P Polidori, A Aldini, W Moreira, P Mendes, M Yildiz, ...
2012 8th International Wireless Communications and Mobile Computing …, 2012
Trust, security and privacy in global computing
JM Seigneur
University of Dublin, Trinity College, School of Computer Science and Statistics, 2005
End-to-end trust starts with recognition
JM Seigneur, S Farrell, CD Jensen, E Gray, Y Chen
Security in Pervasive Computing, 130-142, 2004
Towards a framework for assessing trust-based admission control in collaborative ad hoc applications
E Gray, P O’Connell, C Jensen, S Weber, JM Seigneur, C Yong
Dept. of Computer Science, Trinity College Dublin, Technical Report 66, 2002
Cryptography goes to the cloud
I Agudo, D Nuñez, G Giammatteo, P Rizomiliotis, C Lambrinoudakis
FTRA International Conference on Secure and Trust Computing, Data Management …, 2011
Trust enhanced ubiquitous payment without too much privacy loss
JM Seigneur, CD Jensen
Proceedings of the 2004 ACM symposium on Applied computing, 1593-1599, 2004
P2P with JXTA-Java pipes
JM Seigneur, G Biegel, CD Jensen
Proceedings of the 2nd international conference on Principles and practice …, 2003
Privacy recovery with disposable email addresses
JM Seigneur, CD Jensen
IEEE Security & Privacy 1 (6), 35-39, 2003
Trust transfer: Encouraging self-recommendations without sybil attack
JM Seigneur, A Gray, CD Jensen
International Conference on Trust Management, 321-337, 2005
A survey of trust and risk metrics for a byod mobile worker world: Third international conference on social eco-informatics
JM Seigneur, P Kölndorfer, M Busch, C Hochleitner
Towards security auto-configuration for smart appliances
JM Seigneur, CD Jensen, S Farrell, E Gray, Y Chen
Proceedings of the Smart Objects Conference 2003, 2003
Trust evolution policies for security in collaborative ad hoc applications
E Gray, C Jensen, P O'Connell, S Weber, JM Seigneur, Y Chen
Electronic Notes in Theoretical Computer Science 157 (3), 95-111, 2006
Secure ubiquitous computing based on entity recognition
JM Seigneur, S Farrell, CD Jensen
Workshop on Security in Ubiquitous Computing (UBICOMP2002), 2002
PEARL: A generic architecture for live experiments in a remote lab
T Schafer, JM Seigneur, A Donelly
International Conference on Simulation and Multimedia in Engineering …, 2002
The system can't perform the operation now. Try again later.
Articles 1–20