Trust Management Scheme for Mobile Ad-Hoc Networks
暂无分享,去创建一个
Abdul Sattar | Vallipuram Muthukkumarasamy | Raihana Ferdous | A. Sattar | Raihana Ferdous | V. Muthukkumarasamy
[1] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[2] Xiaoyan Hong,et al. Landmark routing in ad hoc networks with mobile backbones , 2003, J. Parallel Distributed Comput..
[3] Jean-Yves Le Boudec,et al. Nodes bearing grudges: towards routing security, fairness, and robustness in mobile ad hoc networks , 2002, Proceedings 10th Euromicro Workshop on Parallel, Distributed and Network-based Processing.
[4] Hector Garcia-Molina,et al. The Eigentrust algorithm for reputation management in P2P networks , 2003, WWW '03.
[5] Todd Hughes,et al. Dynamic Trust Applied to Ad Hoc Network Resources , 2003 .
[6] Thomas Beth,et al. Valuation of Trust in Open Networks , 1994, ESORICS.
[7] Fred B. Schneider,et al. Towards Fault-Tolerant and Secure Agentry , 1997, WDAG.
[8] Mostafa H. Ammar,et al. A reputation system for peer-to-peer networks , 2003, NOSSDAV '03.
[9] Hans-Joachim Hof,et al. A cluster-based security architecture for ad hoc networks , 2004, IEEE INFOCOM 2004.
[10] Valérie Issarny,et al. Enhanced Reputation Mechanism for Mobile Ad Hoc Networks , 2004, iTrust.
[11] Shambhu Upadhyaya,et al. Securing Information through Trust Management in Wireless Networks , 2004 .
[12] Markus Straßer,et al. A fault-tolerant protocol for providing the exactly-once property of mobile agents , 1998, Proceedings Seventeenth IEEE Symposium on Reliable Distributed Systems (Cat. No.98CB36281).
[13] Dhiraj K. Pradhan,et al. A Cluster-based Approach for Routing in Ad-Hoc Networks , 1995, Symposium on Mobile and Location-Independent Computing.
[14] David J. Scott,et al. Spatial Security Policies for Mobile Agents in a Sentient Computing Environment , 2003, FASE.
[15] Christian F. Tschudin,et al. Protecting Mobile Agents Against Malicious Hosts , 1998, Mobile Agents and Security.
[16] David A. Maltz,et al. Dynamic Source Routing in Ad Hoc Wireless Networks , 1994, Mobidata.
[17] Stephen Hailes,et al. Supporting trust in virtual communities , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.
[18] Carlton R. Davis. A localized trust management scheme for ad hoc networks , 2004 .
[19] Diana K. Smetters,et al. Talking to Strangers: Authentication in Ad-Hoc Wireless Networks , 2002, NDSS.
[20] John S. Baras,et al. On Trust Establishment in Mobile Ad-Hoc Networks , 2002, Security Protocols Workshop.
[21] David B. Johnson,et al. Routing in Ad Hoc Networks of Mobile Hosts , 1994, 1994 First Workshop on Mobile Computing Systems and Applications.
[22] Joan Feigenbaum,et al. Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[23] Stephen Hailes,et al. A distributed trust model , 1998, NSPW '97.
[24] Wenke Lee,et al. A cooperative intrusion detection system for ad hoc networks , 2003, SASN '03.
[25] Abdul Sattar,et al. Trust Formalization in Mobile Ad-Hoc Networks , 2010, 2010 IEEE 24th International Conference on Advanced Information Networking and Applications Workshops.
[26] Boi Faltings,et al. An incentive compatible reputation mechanism , 2003, AAMAS '03.
[27] Zygmunt J. Haas,et al. Securing ad hoc networks , 1999, IEEE Netw..
[28] P. Dewan,et al. Securing P2P networks using peer reputations: is there a silver bullet? , 2005, Second IEEE Consumer Communications and Networking Conference, 2005. CCNC. 2005.
[29] S. Buchegger,et al. A Robust Reputation System for P2P and Mobile Ad-hoc Networks , 2004 .