Using trust for secure collaboration in uncertain environments V Cahill, E Gray, JM Seigneur, CD Jensen, Y Chen, B Shand, N Dimmock, ... IEEE pervasive computing 2 (3), 52-61, 2003 | 496 | 2003 |
Computing with social trust J Golbeck, S Marsh, P Briggs, JM Seigneur, C Castelfranchi, R Falcone, ... Computing with social trust, 2009 | 204 | 2009 |
Trust propagation in small worlds E Gray, JM Seigneur, Y Chen, C Jensen Trust Management: First International Conference, iTrust 2003 Heraklion …, 2003 | 165 | 2003 |
A survey of user-centric identity management technologies T El Maliki, JM Seigneur The International Conference on Emerging Security Information, Systems, and …, 2007 | 163 | 2007 |
Trading privacy for trust JM Seigneur, CD Jensen International Conference on Trust Management, 93-107, 2004 | 142 | 2004 |
Extracting trust from domain analysis: A case study on the wikipedia project P Dondio, S Barrett, S Weber, JM Seigneur Autonomic and Trusted Computing: Third International Conference, ATC 2006 …, 2006 | 92 | 2006 |
Virtual currency and reputation-based cooperation incentives in user-centric networks A Bogliolo, P Polidori, A Aldini, W Moreira, P Mendes, M Yildiz, ... 2012 8th International Wireless Communications and Mobile Computing …, 2012 | 77 | 2012 |
Trust, security and privacy in global computing JM Seigneur University of Dublin, Trinity College, School of Computer Science and Statistics, 2005 | 77 | 2005 |
End-to-end trust starts with recognition JM Seigneur, S Farrell, CD Jensen, E Gray, Y Chen Security in Pervasive Computing: First International Conference, Boppard …, 2004 | 64 | 2004 |
Towards a framework for assessing trust-based admission control in collaborative ad hoc applications E Gray, P O’Connell, C Jensen, S Weber, JM Seigneur, C Yong Dept. of Computer Science, Trinity College Dublin, Technical Report 66, 2002 | 54 | 2002 |
P2P with JXTA-Java pipes JM Seigneur, G Biegel, CD Jensen Proceedings of the 2nd international conference on Principles and practice …, 2003 | 48 | 2003 |
Trust enhanced ubiquitous payment without too much privacy loss JM Seigneur, CD Jensen Proceedings of the 2004 ACM symposium on Applied computing, 1593-1599, 2004 | 47 | 2004 |
Privacy recovery with disposable email addresses JM Seigneur, CD Jensen IEEE Security & Privacy 1 (6), 35-39, 2003 | 42 | 2003 |
Numerical investigation of the early flight phase in ski-jumping N Gardan, A Schneider, G Polidori, H Trenchard, JM Seigneur, ... Journal of biomechanics 59, 29-34, 2017 | 41 | 2017 |
Trust transfer: Encouraging self-recommendations without sybil attack JM Seigneur, A Gray, CD Jensen Trust Management: Third International Conference, iTrust 2005, Paris, France …, 2005 | 37 | 2005 |
How should metaverse augment humans with disabilities? JM Seigneur, MA Choukou 13th Augmented human international conference, 1-6, 2022 | 35 | 2022 |
A survey of trust and risk metrics for a BYOD mobile worker world J Seigneur, P Kölndorfer, M Busch, C Hochleitner Proceedings of SOTICS, 82-91, 2013 | 32 | 2013 |
Towards security auto-configuration for smart appliances JM Seigneur, CD Jensen, S Farrell, E Gray, Y Chen Proceedings of the Smart Objects Conference 2003, 2003 | 30 | 2003 |
Demonstration of security through collaboration in the Digital Business Ecosystem JM Seigneur Workshop of the 1st International Conference on Security and Privacy for …, 2005 | 29 | 2005 |
Trust evolution policies for security in collaborative ad hoc applications E Gray, C Jensen, P O'Connell, S Weber, JM Seigneur, Y Chen Electronic Notes in Theoretical Computer Science 157 (3), 95-111, 2006 | 24 | 2006 |