Trustworthy opportunistic access to the internet of services. Armando, A., Castiglione, A., Costa, G., Fiore, U., Merlo, A., Verderame, L., & You, I. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 7804 LNCS:469-478, 2013. Paper doi bibtex @ARTICLE{Armando2013469,
author={Armando, A., Castiglione, A., Costa, G., Fiore, U., Merlo, A., Verderame, L., You, I.},
title={Trustworthy opportunistic access to the internet of services},
journal={Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)},
year={2013},
volume={7804 LNCS},
pages={469-478},
doi={10.1007/978-3-642-36818-9_52},
url={https://www.scopus.com/inward/record.uri?eid=2-s2.0-84875186835&partnerID=40&md5=a3956d08275e04bb8576ec1231e381f1},
document_type={Conference Paper},
source={Scopus},
}
Downloads: 0
{"_id":"AttLK7MY9gmY3RAqR","bibbaseid":"armando-castiglione-costa-fiore-merlo-verderame-you-trustworthyopportunisticaccesstotheinternetofservices-2013","downloads":0,"creationDate":"2016-08-26T09:24:46.908Z","title":"Trustworthy opportunistic access to the internet of services","author_short":["Armando, A.","Castiglione, A.","Costa, G.","Fiore, U.","Merlo, A.","Verderame, L.","You, I."],"year":2013,"bibtype":"article","biburl":"https://dl.dropboxusercontent.com/u/1703583/BiblioLab.bib","bibdata":{"bibtype":"article","type":"article","author":[{"propositions":[],"lastnames":["Armando"],"firstnames":["A."],"suffixes":[]},{"propositions":[],"lastnames":["Castiglione"],"firstnames":["A."],"suffixes":[]},{"propositions":[],"lastnames":["Costa"],"firstnames":["G."],"suffixes":[]},{"propositions":[],"lastnames":["Fiore"],"firstnames":["U."],"suffixes":[]},{"propositions":[],"lastnames":["Merlo"],"firstnames":["A."],"suffixes":[]},{"propositions":[],"lastnames":["Verderame"],"firstnames":["L."],"suffixes":[]},{"propositions":[],"lastnames":["You"],"firstnames":["I."],"suffixes":[]}],"title":"Trustworthy opportunistic access to the internet of services","journal":"Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)","year":"2013","volume":"7804 LNCS","pages":"469-478","doi":"10.1007/978-3-642-36818-9_52","url":"https://www.scopus.com/inward/record.uri?eid=2-s2.0-84875186835&partnerID=40&md5=a3956d08275e04bb8576ec1231e381f1","document_type":"Conference Paper","source":"Scopus","bibtex":"@ARTICLE{Armando2013469,\nauthor={Armando, A., Castiglione, A., Costa, G., Fiore, U., Merlo, A., Verderame, L., You, I.},\ntitle={Trustworthy opportunistic access to the internet of services},\njournal={Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)},\nyear={2013},\nvolume={7804 LNCS},\npages={469-478},\ndoi={10.1007/978-3-642-36818-9_52},\nurl={https://www.scopus.com/inward/record.uri?eid=2-s2.0-84875186835&partnerID=40&md5=a3956d08275e04bb8576ec1231e381f1},\ndocument_type={Conference Paper},\nsource={Scopus},\n}\n\n","author_short":["Armando, A.","Castiglione, A.","Costa, G.","Fiore, U.","Merlo, A.","Verderame, L.","You, I."],"key":"Armando2013469","id":"Armando2013469","bibbaseid":"armando-castiglione-costa-fiore-merlo-verderame-you-trustworthyopportunisticaccesstotheinternetofservices-2013","role":"author","urls":{"Paper":"https://www.scopus.com/inward/record.uri?eid=2-s2.0-84875186835&partnerID=40&md5=a3956d08275e04bb8576ec1231e381f1"},"downloads":0},"search_terms":["trustworthy","opportunistic","access","internet","services","armando","castiglione","costa","fiore","merlo","verderame","you"],"keywords":["dblp"],"authorIDs":[],"dataSources":["EQov9rEvkmMf5P4ah"]}