An update on attempted man-in-the-middle at- tacks, Google Online Security Blog, issue.1, 2011. ,
Diameter of the world-wide web, Nature, vol.401, pp.130-131, 1999. ,
Computing multi-party trust privately, Proceedings of the 2010 ACM Symposium on Applied Computing, SAC '10, pp.1460-1465, 2010. ,
DOI : 10.1145/1774088.1774401
Ten risks of PKI: What you're not being told about Public Key Infrastructure, Computer Security Journal, vol.16, issue.1, pp.1-7, 2000. ,
Communicability graph and community structures in complex networks, Applied Mathematics and Computation, vol.214, issue.2, pp.500-511, 2009. ,
DOI : 10.1016/j.amc.2009.04.024
Aggregating Trust Using Triangular Norms in the KeyNote Trust Management System, Security and Trust Management -6th International Workshop, STM 2010, pp.100-115, 2010. ,
DOI : 10.1007/978-3-642-22444-7_7
Distribution of Subdominant Eigenvalues of Matrices with Random Rows, SIAM Journal on Matrix Analysis and Applications, vol.24, issue.3, pp.137-151, 2000. ,
DOI : 10.1137/S0895479801389102
Security alert: Fraudulent digital certificates, SANS Institute InfoSec Reading Room, 2001. ,
High-performance implementation of the level-3 BLAS, ACM Transactions on Mathematical Software, vol.35, issue.1, pp.1-4, 2008. ,
DOI : 10.1145/1377603.1377607
Trust Computations and Trust Dynamics in Mobile Adhoc Networks: A Survey, IEEE Communications Surveys & Tutorials, vol.14, issue.2, pp.279-298, 2012. ,
DOI : 10.1109/SURV.2011.042711.00083
Propagation of trust and distrust, Proceedings of the 13th conference on World Wide Web , WWW '04, pp.403-412, 2004. ,
DOI : 10.1145/988672.988727
A calculus of trust and its application to PKI and identity management, Proceedings of the 8th Symposium on Identity and Trust on the Internet, IDtrust '09, pp.23-37, 2009. ,
DOI : 10.1145/1527017.1527021
A Formal-Semantics-Based Calculus of Trust, IEEE Internet Computing, vol.14, issue.5, pp.38-46, 2010. ,
DOI : 10.1109/MIC.2010.83
Trust Extortion on the Internet, Security and Trust Management, pp.6-21, 2012. ,
DOI : 10.1007/978-3-642-29963-6_2
Probabilistic logic under uncertainty, Proceedings of Computing: The Australian Theory Symposium (CATS'07), 2007. ,
Transitivity and aggregation in trust networks, Proc. of the 21st Workshop on Information Technologies and Systems, 2010. ,
A proposal for collaborative internet-scale trust infrastructures deployment, Proceedings of the 9th Symposium on Identity and Trust on the Internet, IDTRUST '10, pp.108-116, 2010. ,
DOI : 10.1145/1750389.1750404
PEACHES and Peers, Proceedings of the 5th European PKI workshop on Public Key Infrastructure: Theory and Practice, EuroPKI '08, pp.223-238, 2008. ,
DOI : 10.1007/978-3-540-69485-4_16
Resilient authentication using path independence, IEEE Transactions on Computers, vol.47, issue.12, pp.1351-1362, 1998. ,
DOI : 10.1109/12.737682
An Interdomain PKI Model Based on Trust Lists, Public Key Infrastructure, 4th European PKI Workshop: Theory and Practice Proceedings, volume 4582 of Lecture Notes in Computer Science, pp.49-64, 2007. ,
DOI : 10.1007/978-3-540-73408-6_4
Privacy and Liveliness for Reputation Systems, Public Key Infrastructures , Services and Applications -6th European Workshop, pp.209-224, 2009. ,
DOI : 10.1007/978-3-642-16441-5_14
URL : https://lirias.kuleuven.be/bitstream/123456789/244794/2/article-1265.pdf
A structured overview of 50 years of small-world research, Social Networks, vol.31, issue.3, pp.165-178, 2009. ,
DOI : 10.1016/j.socnet.2008.12.004
Automated empirical optimizations of software and the ATLAS project, Parallel Computing, vol.27, issue.1-2, pp.3-35, 2001. ,
DOI : 10.1016/S0167-8191(00)00087-9