All Stories

  1. Editorial: Augmenting human experience and performance through interaction technologies
  2. A Rule-Language Tailored for Financial Inclusion and KYC/AML Compliance
  3. NFT Trust Survey
  4. Using Decentralized Social Trust as an Alternative Way to Prove Someone’s Address
  5. How should metaverse augment humans with disabilities?
  6. Recognition System for Behavior & Activities of Daily Living Among Patients with Dementia Using Smart Algorithms and Assistive Technology
  7. Session details: Theme: Distributed systems: DAPP - decentralized applications with blockchain, DLT and crypto-currencies track
  8. Towards a decentralized social trust solution to proof-of-address
  9. The Role of Technology in Senior Co-Caregiving Support
  10. Biomechanics of Trail Running Performance: Quantification of Spatio-Temporal Parameters by Using Low Cost Sensors in Ecological Conditions
  11. A Survey of KYC/AML for Cryptocurrencies Transactions
  12. Body chain
  13. Session details: Theme: Distributed systems: DAPP - Decentralized applications with blockchain, DLT and crypto-currencies track
  14. Blockchain real estate relational value survey
  15. Hardware TOTP tokens with time synchronization
  16. A Survey on Trust in Augmented Human Technologies
  17. Preface of the Section Focused on Superhuman Technology
  18. Enhancing RADIUS based multifactor-factor authentication systems with RESTful API for self-service enrolment
  19. Numerical investigation of the early flight phase in ski-jumping
  20. Design and validation of a trust-based opportunity-enabled risk management system
  21. Efficient Security Adaptation Framework for Internet of Things
  22. Beacon authpath: Augmented human path authentication
  23. Augmented Winter Ski with AR HMD
  24. Electrosmog Visualization through Augmented Blurry Vision
  25. Wi-trust: Improving Wi-Fi hotspots trustworthiness with computational trust management
  26. WiFiOTP: Pervasive two-factor authentication using Wi-Fi SSID broadcasts
  27. Formal Modeling and Verification of Opportunity-enabled Risk Management
  28. Swiss innovation online reputation case study
  29. TEFIS: A single access point for conducting multifaceted experiments on heterogeneous test facilities
  30. Case study
  31. Online Identity and User Management Services
  32. Extending Trust Management with Cooperation Incentives: Achieving Collaborative Wi-Fi Sharing Using Trust Transfer to Stimulate Cooperative Behaviours
  33. On the Tradeoff among Trust, Privacy, and Cost in Incentive-Based Networks
  34. Achieving Collaborative Wi-Fi Sharing without Changing Current Technologies
  35. Special Issue on Advanced Information Security for Secure and Trust Computing
  36. Secure user-friendly Wi-Fi access point joining
  37. Dispositional Trust Adaptation in User-Centric Networks
  38. Online Identity and User Management Services
  39. Online e-Reputation Management Services
  40. Virtual currency and reputation-based cooperation incentives in user-centric networks
  41. Crowd augmented wireless access
  42. Flexible Communication: A Secure and Trust-Based Free Wi-Fi Password Sharing Service
  43. Adaptive Trust Management
  44. The emotional economy for the augmented human
  45. Trust and Reputation for Successful Software Self-organisation
  46. A Security Adaptation Reference Monitor (SARM) for Highly Dynamic Wireless Environments
  47. Verifying Hotspot Quality User Rating with Certified QoS Evidence
  48. Towards mobile/wearable device electrosmog reduction through careful network selection
  49. Identity Management
  50. Mobile Location-Based Services for Trusted Information in Disaster Management
  51. Reputation Management
  52. Fourth special track on Trust, Recommendations, Evidence and other Collaboration Know-how (TRECK'08)
  53. Preface
  54. Towards Trustworthy Spatial Messaging
  55. Trust Engines to Optimize Semi-Automated Industrial Production Planning
  56. A Survey of User-centric Identity Management Technologies
  57. Message from the SSNDS 2007 Symposium Chairs
  58. Trustworthily Forwarding Sensor Networks Information to the Internet
  59. Trustworthiness of collaborative Open Source Software quality assessment
  60. Trust Evolution Policies for Security in Collaborative Ad Hoc Applications
  61. Extracting Trust from Domain Analysis: A Case Study on the Wikipedia Project
  62. Editorial message special track on trust, recommendations, evidence and other collaboration know-how (TRECK)
  63. Fostering sustainability via trust engines
  64. The Claim Tool Kit for ad hoc recognition of peer entities
  65. Interacting with trust in ambient intelligence
  66. Trading Privacy for Trust
  67. Trust Management
  68. Privacy recovery with disposable email addresses
  69. Using trust for secure collaboration in uncertain environments
  70. User-Centric Identity, Trust and Privacy
  71. Demonstration of security through collaboration in the digital business ecosystem
  72. SECOVAL: the IEEE/CREATE-NET workshop on the value of security through collaboration
  73. Risk probability estimating based on clustering