The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Yan Wang 0002: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Ching Lin, Vijay Varadharajan, Yan Wang, Vineet Pruthi
    Enhancing Grid Security with Trust Management. [Citation Graph (0, 0)][DBLP]
    IEEE SCC, 2004, pp:303-310 [Conf]
  2. Yan Wang, Vijay Varadharajan
    Trust2: Developing Trust in Peer-to-Peer Environments. [Citation Graph (0, 0)][DBLP]
    IEEE SCC, 2005, pp:24-34 [Conf]
  3. Yan Wang, Kian-Lee Tan, Xiaolin Pang
    Several Structures for Protecting the Routes of Mobile Agents Dispatched in Parallel. [Citation Graph (0, 0)][DBLP]
    DEXA Workshops, 2002, pp:734-738 [Conf]
  4. Yan Wang, Kian-Lee Tan, Xiaolin Pang
    A Parallel Dispatch Model with Secure and Robust Routes for Mobile Agents. [Citation Graph (0, 0)][DBLP]
    EC-Web, 2002, pp:129-138 [Conf]
  5. Yan Wang, Vijay Varadharajan
    Interaction Trust Evaluation in Decentralized Environments. [Citation Graph (0, 0)][DBLP]
    EC-Web, 2004, pp:144-153 [Conf]
  6. Yan Wang, Vijay Varadharajan
    Two-Phase Peer Evaluation in P2P E-Commerce Environments. [Citation Graph (0, 0)][DBLP]
    EEE, 2005, pp:654-657 [Conf]
  7. Yan Wang, Vijay Varadharajan
    A Mobile Autonomous Agent-based Secure Payment Protocol Supporting Multiple Payments. [Citation Graph (0, 0)][DBLP]
    IAT, 2005, pp:88-94 [Conf]
  8. Yan Wang, Fu-ren Lin
    Trust and Risk Evaluation of Transactions with Different Amounts in Peer-to-Peer E-commerce Environments. [Citation Graph (0, 0)][DBLP]
    ICEBE, 2006, pp:102-109 [Conf]
  9. Xiaolin Pang, Kian-Lee Tan, Yan Wang, Jian Ren
    A Secure Agent-Mediated Payment Protocol. [Citation Graph (0, 0)][DBLP]
    ICICS, 2002, pp:422-433 [Conf]
  10. Yan Wang, Chi-Hung Chi, Tie-Yan Li
    Secure Route Structures for the Fast Dispatch of Large-Scale Mobile Agents. [Citation Graph (0, 0)][DBLP]
    ICICS, 2003, pp:22-33 [Conf]
  11. Yan Wang, Kian-Lee Tan
    Dispatching Mobile Agents with Secure Routes in Parallel. [Citation Graph (0, 0)][DBLP]
    ICICS, 2001, pp:386-397 [Conf]
  12. Yan Wang
    Dispatching Multiple Mobile Agents in Parallel for Visiting E-Shops. [Citation Graph (0, 0)][DBLP]
    Mobile Data Management, 2002, pp:61-0 [Conf]
  13. Yan Wang, Jian Ren
    Building Internet Marketplaces on the Basis of Mobile Agents for Parallel Processing. [Citation Graph (0, 0)][DBLP]
    Mobile Data Management, 2002, pp:53-60 [Conf]
  14. Ching Lin, Vijay Varadharajan, Yan Wang
    Maximizing Utility of Mobile Agent Based E-Commerce Applications with Trust Enhanced Security. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2005, pp:151-160 [Conf]
  15. Ching Lin, Vijay Varadharajan, Yan Wang, Yi Mu
    On the Design of a New Trust Model for Mobile Agent Security. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2004, pp:60-69 [Conf]
  16. Ching Lin, Vijay Varadharajan, Yan Wang, Vineet Pruthi
    Trust Enhanced Security for Mobile Agents. [Citation Graph (0, 0)][DBLP]
    CEC, 2005, pp:231-238 [Conf]
  17. Yan Wang, Tieyan Li
    LITESET/A++: A New Agent-Assisted Secure Payment Protocol. [Citation Graph (0, 0)][DBLP]
    CEC, 2004, pp:244-251 [Conf]
  18. Jian Ren, Yan Wang, Xiaolin Pang, Kian-Lee Tan
    A 2-Phase Evaluation Model for Agent-Mediated Internet Marketplaces. [Citation Graph (0, 0)][DBLP]
    WISE (1), 2001, pp:63-71 [Conf]
  19. Yan Wang, Vijay Varadharajan
    A Time-Based Peer Trust Evaluation in P2P E-commerce Environments. [Citation Graph (0, 0)][DBLP]
    WISE, 2004, pp:730-735 [Conf]
  20. Yan Wang, Kian-Lee Tan, Jian Ren
    Towards Autonomous and Automatic Evaluation and Negotiation in Agent-Mediated Internet Marketplaces. [Citation Graph (0, 0)][DBLP]
    Electronic Commerce Research, 2005, v:5, n:3-4, pp:343-365 [Journal]
  21. Yan Wang, Kian-Lee Tan, Jian Ren
    PumaMart: a parallel and autonomous agents based internet marketplace. [Citation Graph (0, 0)][DBLP]
    Electronic Commerce Research and Applications, 2004, v:3, n:3, pp:294-310 [Journal]
  22. Yan Wang, Vijay Varadharajan
    Role-based Recommendation and Trust Evaluation. [Citation Graph (0, 0)][DBLP]
    CEC/EEE, 2007, pp:278-288 [Conf]

  23. Trust Evaluation in Composite Services Selection and Discovery. [Citation Graph (, )][DBLP]


  24. A Heuristic Algorithm for Trust-Oriented Service Provider Selection in Complex Social Networks. [Citation Graph (, )][DBLP]


  25. Optimal Social Trust Path Selection in Complex Social Networks. [Citation Graph (, )][DBLP]


  26. Accountability Computing for E-society. [Citation Graph (, )][DBLP]


  27. Fuzzy Regression Based Trust Prediction in Service-Oriented Applications. [Citation Graph (, )][DBLP]


  28. The Design of A Rule-based and Event-driven Trust Management Framework. [Citation Graph (, )][DBLP]


  29. A Quantitative Service Accountability Model. [Citation Graph (, )][DBLP]


  30. Trust-Oriented Composite Service Selection and Discovery. [Citation Graph (, )][DBLP]


  31. A Trust Vector Approach to Service-Oriented Applications. [Citation Graph (, )][DBLP]


  32. From Representational State Transfer to Accountable State Transfer Architecture. [Citation Graph (, )][DBLP]


  33. A Meta-modeling Framework to Support Accountability in Business Process Modeling. [Citation Graph (, )][DBLP]


  34. Price Trust Evaluation in E-service Oriented Applications. [Citation Graph (, )][DBLP]


  35. Mobile Agent and Web Service Integration Security Architecture. [Citation Graph (, )][DBLP]


  36. A New Security Scheme for Integration of Mobile Agents and Web Services. [Citation Graph (, )][DBLP]


  37. Trust Inference in Complex Trust-Oriented Social Networks. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.333secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002