Establishing trust relationships in OppNets using Merkle trees
暂无分享,去创建一个
[1] Sajal K. Das,et al. A trust-based framework for data forwarding in opportunistic networks , 2013, Ad Hoc Networks.
[2] Mohammad S. Obaidat,et al. Trust-based Security Protocol against blackhole attacks in opportunistic networks , 2013, 2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).
[3] Franck Legendre,et al. Social Trust in Opportunistic Networks , 2010, 2010 INFOCOM IEEE Conference on Computer Communications Workshops.
[4] Edson dos Santos Moreira,et al. Trust Management in Opportunistic Networks , 2010, 2010 Ninth International Conference on Networks.
[5] Robin Doss,et al. Defense against packet dropping attacks in opportunistic networks , 2014, 2014 International Conference on Advances in Computing, Communications and Informatics (ICACCI).
[6] Ralph C. Merkle,et al. Protocols for Public Key Cryptosystems , 1980, 1980 IEEE Symposium on Security and Privacy.
[7] Marianne Azer,et al. A Novel Proximity Based Trust Model for Opportunistic Networks , 2013, 2013 International Conference on Availability, Reliability and Security.
[8] Werner Vogels,et al. Dynamo: amazon's highly available key-value store , 2007, SOSP.
[9] Isaac Woungang,et al. Trust Management in Opportunistic Networks: A Semantic Web Approach , 2009, 2009 World Congress on Privacy, Security, Trust and the Management of e-Business.
[10] Karin Anna Hummel,et al. Preventing spam in opportunistic networks , 2014, Comput. Commun..