Login / Signup
Repairing the trust in ride-sharing after security incidents.
Aihui Chen
Jinlin Wan
Yaobin Lu
Published in:
Ind. Manag. Data Syst. (2022)
Keyphrases
</>
trust management
security services
trusted computing
trust relationships
trust negotiation
intrusion detection
information security
privacy concerns
public key infrastructure
trust model
security issues
access control
security protocols
trust evaluation
security policies
security management
statistical databases
security model
network security
usage control
information systems
digital signature
security mechanisms
security requirements
rfid tags