Securing Information through Trust Management in Wireless Networks
暂无分享,去创建一个
[1] Michael K. Molloy. Performance Analysis Using Stochastic Petri Nets , 1982, IEEE Transactions on Computers.
[2] Jiejun Kong,et al. Providing robust and ubiquitous security support for mobile ad-hoc networks , 2001, Proceedings Ninth International Conference on Network Protocols. ICNP 2001.
[3] Stephen Hailes,et al. A distributed trust model , 1998, NSPW '97.
[4] Todd Hughes,et al. Dynamic Trust Applied to Ad Hoc Network Resources , 2003 .
[5] O. Spaniol,et al. Establishing Pair-wise Keys for Secure Communication in Ad-Hoc Networks Seminar: Pervasive Computing SS 2004 , 2022 .
[6] Kevin A. Kwiat,et al. An analytical framework for reasoning about intrusions , 2001, Proceedings 20th IEEE Symposium on Reliable Distributed Systems.
[7] Carlton R. Davis. A localized trust management scheme for ad hoc networks , 2004 .
[8] John S. Baras,et al. On Trust Establishment in Mobile Ad-Hoc Networks , 2002, Security Protocols Workshop.
[9] Zygmunt J. Haas,et al. Securing ad hoc networks , 1999, IEEE Netw..
[10] Diana K. Smetters,et al. Talking to Strangers: Authentication in Ad-Hoc Wireless Networks , 2002, NDSS.
[11] Wenke Lee,et al. A cooperative intrusion detection system for ad hoc networks , 2003, SASN '03.
[12] Nitin H. Vaidya,et al. Location-aided routing (LAR) in mobile ad hoc networks , 1998, MobiCom '98.
[13] Sushil Jajodia,et al. An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.
[14] Philip S. Yu,et al. Cross-feature analysis for detecting ad-hoc routing anomalies , 2003, 23rd International Conference on Distributed Computing Systems, 2003. Proceedings..
[15] Fred B. Schneider,et al. COCA: a secure distributed online certification authority , 2002 .
[16] Haiyun Luo,et al. Adaptive Security for Multi-layer Ad-hoc Networks , 2002 .