A dynamic trust model for mobile ad hoc networks
暂无分享,去创建一个
[1] Yih-Chun Hu,et al. SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2002, Proceedings Fourth IEEE Workshop on Mobile Computing Systems and Applications.
[2] Sonja Buchegger,et al. Cooperative Routing in Mobile Ad-hoc Networks: Current Efforts Against Malice and Selfishness , 2002, GI Jahrestagung.
[3] Zygmunt J. Haas,et al. Securing ad hoc networks , 1999, IEEE Netw..
[4] Michael K. Reiter,et al. Resilient Authentication Using Path Independence , 1998, IEEE Trans. Computers.
[5] Bharat Bhargava,et al. Trusted Routing and Intruder Identification in Mobile Ad Hoc Networks , 2002 .
[6] Levente Buttyán,et al. Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks , 2003, Mob. Networks Appl..
[7] Xia Wang. Intrusion Detection Techniques in Wireless Ad Hoc Networks , 2006, 30th Annual International Computer Software and Applications Conference (COMPSAC'06).
[8] Yih-Chun Hu,et al. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2002, MobiCom '02.
[9] David A. Bell,et al. Secure computer systems: mathematical foundations and model , 1973 .
[10] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[11] Stephen Hailes,et al. A distributed trust model , 1998, NSPW '97.
[12] David A. Wagner,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.
[13] Andrew T. Campbell,et al. P-MIP: Paging Extensions for Mobile IP , 2002, Mob. Networks Appl..