Markov Chain-Based Trust Model for Analyzing Trust Value in Distributed Multicasting Mobile Ad Hoc Networks
暂无分享,去创建一个
Ben-Jye Chang | De-Yu Wang | Ying-Hsin Liang | Szu-Liang Kuo | Ben-Jye Chang | Ying-Hsin Liang | De-Yu Wang | Szu-Liang Kuo
[1] Tracy Camp,et al. A survey of mobility models for ad hoc network research , 2002, Wirel. Commun. Mob. Comput..
[2] Diego Gambetta. Trust : making and breaking cooperative relations , 1992 .
[3] Xiaoyan Hong,et al. Modeling Ad-hoc rushing attack in a negligibility-based security framework , 2006, WiSe '06.
[4] Silvia Giordano,et al. Mobile ad hoc networks , 2002 .
[5] Yue Xu,et al. An Analysis of Trust Transitivity Taking Base Rate into Account , 2009, 2009 Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing.
[6] John S. Baras,et al. Trust evaluation in ad-hoc networks , 2004, WiSe '04.
[7] Ling Liu,et al. Building Trust in Decentralized Peer-to-Peer Electronic Communities , 2002 .
[8] Zhu Han,et al. Information theoretic framework of trust modeling and evaluation for ad hoc networks , 2006, IEEE Journal on Selected Areas in Communications.
[9] Audun Jøsang,et al. A survey of trust and reputation systems for online service provision , 2007, Decis. Support Syst..
[10] Junde Song,et al. Strategy proof trust management in wireless ad hoc network , 2004, Canadian Conference on Electrical and Computer Engineering 2004 (IEEE Cat. No.04CH37513).
[11] Theodore Y. Ts'o,et al. Kerberos: an authentication service for computer networks , 1994, IEEE Communications Magazine.
[12] Giorgos Zacharia,et al. Trust management through reputation mechanisms , 2000, Appl. Artif. Intell..
[13] Haiyun Luo,et al. Security in mobile ad hoc networks: challenges and solutions , 2004, IEEE Wireless Communications.
[14] Dickson K. W. Chiu,et al. Supporting the legal identities of contracting agents with an agent authorization platform , 2005, ICEC '05.
[15] Xiaoyan Hong,et al. A secure ad-hoc routing approach using localized self-healing communities , 2005, MobiHoc '05.
[16] Vana Kalogeraki,et al. Decentralized trust management for ad-hoc peer-to-peer networks , 2006, MPAC '06.
[17] Chris McDonald,et al. Trust Establishment In Pure Ad-hoc Networks , 2006, Wirel. Pers. Commun..
[18] P. Papadimitratos. Secure ad hoc networking , 2006, CCNC 2006. 2006 3rd IEEE Consumer Communications and Networking Conference, 2006..
[19] Philip R. Zimmermann,et al. The official PGP user's guide , 1996 .
[20] Refik Molva,et al. Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.
[21] Jean-Yves Le Boudec,et al. Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.
[22] Alice Bob,et al. The PGP Trust Model , 2005 .
[23] Enrico Macii,et al. Markovian analysis of large finite state machines , 1996, IEEE Trans. Comput. Aided Des. Integr. Circuits Syst..
[24] Jean-Yves Le Boudec,et al. Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.
[25] Taylor Yu. The Kerberos Network Authentication Service (Version 5) , 2007 .
[26] Keith W. Ross,et al. The Index Poisoning Attack in P2P File Sharing Systems , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[27] Audun Jøsang,et al. Semantic Constraints for Trust Transitivity , 2005, APCCM.
[28] Richard N. Taylor,et al. Architectural support for trust models in decentralized applications , 2006, ICSE.
[29] Evangelos Kotsovinos,et al. BambooTrust: practical scalable trust management for global public computing , 2006, SAC.
[30] Archana Bharathidasan,et al. Sensor Networks : An Overview , 2002 .
[31] Prashant Sharma,et al. Secure multicast model for ad-hoc military networks , 2004, Proceedings. 2004 12th IEEE International Conference on Networks (ICON 2004) (IEEE Cat. No.04EX955).
[32] Mahalingam Ramkumar,et al. Pre-loaded key based multicast and broadcast authentication in mobile ad-hoc networks , 2003, GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489).