Data-centric trust in ephemeral networks
暂无分享,去创建一个
[1] Panagiotis Papadimitratos,et al. Secure vehicular communication systems: design and architecture , 2008, IEEE Communications Magazine.
[2] Jean-Yves Le Boudec,et al. Self-policing mobile ad hoc networks by reputation systems , 2005, IEEE Communications Magazine.
[3] Thomas M. Chen,et al. Dempster-Shafer theory for intrusion detection in ad hoc networks , 2005, IEEE Internet Computing.
[4] Roger Dingledine,et al. Reliable MIX Cascade Networks through Reputation , 2002, Financial Cryptography.
[5] Haiyun Luo,et al. URSA: ubiquitous and robust access control for mobile ad hoc networks , 2004, IEEE/ACM Transactions on Networking.
[6] Lawrence A. Klein,et al. Sensor Technologies and Data Requirements for Its , 2001 .
[7] A. Festag,et al. Security Architecture for Vehicular Communication , 2007 .
[8] Claude Crépeau,et al. A certificate revocation scheme for wireless ad hoc networks , 2003, SASN '03.
[9] Burton H. Bloom,et al. Space/time trade-offs in hash coding with allowable errors , 1970, CACM.
[10] Lutz Gollan. DIGITAL SIGNATURES FOR AUTOMOBILES ? ! , 2002 .
[11] Hovav Shacham,et al. Aggregate and Verifiably Encrypted Signatures from Bilinear Maps , 2003, EUROCRYPT.
[12] Xue Liu,et al. PDA: Privacy-Preserving Data Aggregation in Wireless Sensor Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[13] Florian Dotzer,et al. Enhancing the Security of Local DangerWarnings in VANETs - A Simulative Analysis of Voting Schemes , 2007, The Second International Conference on Availability, Reliability and Security (ARES'07).
[14] Peter Bro Miltersen,et al. Privacy-Enhancing First-Price Auctions Using Rational Cryptography , 2008, IACR Cryptol. ePrint Arch..
[15] Nitin H. Vaidya,et al. A vehicle-to-vehicle communication protocol for cooperative collision warning , 2004, The First Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, 2004. MOBIQUITOUS 2004..
[16] Hillol Kargupta,et al. Peer-to-Peer Data Mining, Privacy Issues, and Games , 2007, AIS-ADM.
[17] Ueli Maurer,et al. Confidence Valuation in a Public-Key Infrastructure Based on Uncertain Evidence , 2000, Public Key Cryptography.
[18] John S. Baras,et al. On trust models and trust evaluation metrics for ad hoc networks , 2006, IEEE Journal on Selected Areas in Communications.
[19] Maxim Raya,et al. Mix-Zones for Location Privacy in Vehicular Networks , 2007 .
[20] Maxim Raya,et al. TraCI: an interface for coupling road traffic and network simulators , 2008, CNS '08.
[21] Jolyon Clulow,et al. New Strategies for Revocation in Ad-Hoc Networks , 2007, ESAS.
[22] M. Dufwenberg. Game theory. , 2011, Wiley interdisciplinary reviews. Cognitive science.
[23] Haiyun Luo,et al. Adaptive security for multilevel ad hoc networks , 2002, Wirel. Commun. Mob. Comput..
[24] André Weimerskirch,et al. State of the Art: Embedding Security in Vehicles , 2007, EURASIP J. Embed. Syst..
[25] W. Enkelmann. FleetNet - applications for inter-vehicle communication , 2003, IEEE IV2003 Intelligent Vehicles Symposium. Proceedings (Cat. No.03TH8683).
[26] John S. Baras,et al. Trust Evaluation in Anarchy: A Case Study on Autonomous Networks , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[27] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[28] Robin Kravets,et al. MOCA : MObile Certificate Authority for Wireless Ad Hoc Networks , 2004 .
[29] David Peleg,et al. Local majorities, coalitions and monopolies in graphs: a review , 2002, Theor. Comput. Sci..
[30] Maxim Raya,et al. Security Aspects of Inter-Vehicle Communications , 2005 .
[31] Christian Damsgaard Jensen,et al. Trading Privacy for Trust , 2004, iTrust.
[32] Panagiotis Papadimitratos,et al. TraNS: realistic joint traffic and network simulator for VANETs , 2008, MOCO.
[33] John Burgess,et al. Surviving attacks on disruption-tolerant networks without authentication , 2007, MobiHoc '07.
[34] Tim Leinmüller,et al. POSITION VERIFICATION APPROACHES FOR VEHICULAR AD HOC NETWORKS , 2006, IEEE Wireless Communications.
[35] Zygmunt J. Haas,et al. Securing ad hoc networks , 1999, IEEE Netw..
[36] B. Lampson,et al. Authentication in distributed systems: theory and practice , 1991, TOCS.
[37] Joseph Y. Halpern,et al. Rational secret sharing and multiparty computation: extended abstract , 2004, STOC '04.
[38] Yih-Chun Hu,et al. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2002, MobiCom '02.
[39] Manfred Kochen,et al. On the economics of information , 1972, J. Am. Soc. Inf. Sci..
[40] Srdjan Capkun,et al. Self-Organized Public-Key Management for Mobile Ad Hoc Networks , 2003, IEEE Trans. Mob. Comput..
[41] Raja Sengupta,et al. Vehicle-to-vehicle safety messaging in DSRC , 2004, VANET '04.
[42] Nalini Venkatasubramanian,et al. Security Issues in a Future Vehicular Network , 2002 .
[43] Peifang Zheng,et al. Tradeoffs in certificate revocation schemes , 2003, CCRV.
[44] Jonathan Katz,et al. Bridging Game Theory and Cryptography: Recent Results and Future Directions , 2008, TCC.
[45] Zhu Han,et al. Information theoretic framework of trust modeling and evaluation for ad hoc networks , 2006, IEEE Journal on Selected Areas in Communications.
[46] G. Stigler. The Economics of Information , 1961, Journal of Political Economy.
[47] J.-P. Hubaux,et al. Architecture for Secure and Private Vehicular Communications , 2007, 2007 7th International Conference on ITS Telecommunications.
[48] Markus Radimirsch,et al. Medium access and radio resource management for ad hoc networks based on UTRA TDD , 2001, MobiHoc '01.
[49] John S. Baras,et al. On Trust Establishment in Mobile Ad-Hoc Networks , 2002, Security Protocols Workshop.
[50] Maxim Raya,et al. Efficient secure aggregation in VANETs , 2006, VANET '06.
[51] Bharat Bhargava,et al. Trading Privacy for Trust in Online Interactions , 2007 .
[52] Maxim Raya,et al. DOMINO: a system to detect greedy behavior in IEEE 802.11 hotspots , 2004, MobiSys '04.
[53] S. Buchegger,et al. A Robust Reputation System for P2P and Mobile Ad-hoc Networks , 2004 .
[54] Jessica Staddon,et al. Detecting and correcting malicious data in VANETs , 2004, VANET '04.
[55] Panagiotis Papadimitratos,et al. Eviction of Misbehaving and Faulty Nodes in Vehicular Networks , 2007, IEEE Journal on Selected Areas in Communications.
[56] Andreas Pfitzmann,et al. Anonymity, Unobservability, and Pseudonymity - A Proposal for Terminology , 2000, Workshop on Design Issues in Anonymity and Unobservability.
[57] Zhiyi Fang,et al. Securing Vehicular Ad Hoc Networks , 2007, 2007 2nd International Conference on Pervasive Computing and Applications.
[58] Pascal Vasseur,et al. Introduction to Multisensor Data Fusion , 2005, The Industrial Information Technology Handbook.
[59] Hovav Shacham,et al. Short Signatures from the Weil Pairing , 2001, J. Cryptol..
[60] Tim Roughgarden,et al. Algorithmic Game Theory , 2007 .
[61] Tyler Moore,et al. The Economics of Information Security , 2006, Science.
[62] David Cooper,et al. Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile , 2008, RFC.
[63] Prakash P. Shenoy,et al. On the plausibility transformation method for translating belief function models to probability models , 2006, Int. J. Approx. Reason..
[64] Pin-Han Ho,et al. An Efficient Identity-Based Batch Verification Scheme for Vehicular Sensor Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[65] Judea Pearl,et al. Probabilistic reasoning in intelligent systems - networks of plausible inference , 1991, Morgan Kaufmann series in representation and reasoning.
[66] Jochen Mundinger,et al. Reputation in self-organized communication systems and beyond , 2006 .
[67] Vikash V. Gayah,et al. Crash Risk Assessment Using Intelligent Transportation Systems Data and Real-Time Intervention Strategies to Improve Safety on Freeways , 2007, J. Intell. Transp. Syst..
[68] Panagiotis Papadimitratos,et al. SECURING VEHICULAR COMMUNICATIONS , 2006, IEEE Wireless Communications.
[69] Haiyun Luo,et al. Security in mobile ad hoc networks: challenges and solutions , 2004, IEEE Wireless Communications.
[70] Adi Shamir,et al. How to share a secret , 1979, CACM.
[71] Jean-Pierre Hubaux,et al. Security and Cooperation in Wireless Networks , 2007, ESAS.
[72] Mike Bond,et al. Cryptographic Processors-A Survey , 2006, Proceedings of the IEEE.
[73] Brian L. Mark,et al. Robust cooperative trust establishment for MANETs , 2006, SASN '06.
[74] Azim Eskandarian,et al. The threat of intelligent collisions , 2004, IT Professional.
[75] Mani B. Srivastava,et al. Reputation-based framework for high integrity sensor networks , 2004, SASN '04.
[76] Muthucumaru Maheswaran,et al. A localized certificate revocation scheme for mobile ad hoc networks , 2008, Ad Hoc Networks.
[77] Danny Dolev,et al. Distributed computing meets game theory: robust mechanisms for rational secret sharing and multiparty computation , 2006, PODC '06.
[78] Craig Gentry,et al. Ordered multisignatures and identity-based sequential aggregate signatures, with applications to secure routing , 2007, CCS '07.
[79] Panagiotis Papadimitratos,et al. Efficient and robust pseudonymous authentication in VANET , 2007, VANET '07.
[80] Markus Jakobsson,et al. Efficient attribute authentication with applications to ad hoc networks , 2004, VANET '04.
[81] Dan Boneh,et al. A Brief Look at Pairings Based Cryptography , 2007, 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS'07).
[82] Basil S. Maglaris,et al. Towards multisensor data fusion for DoS detection , 2004, SAC '04.
[83] Yih-Chun Hu,et al. Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[84] Adrian Perrig,et al. Challenges in Securing Vehicular Networks , 2005 .
[85] Boi Faltings,et al. Collusion-resistant, incentive-compatible feedback payments , 2007, EC '07.
[86] Adrian Perrig,et al. On the distribution and revocation of cryptographic keys in sensor networks , 2005, IEEE Transactions on Dependable and Secure Computing.
[87] Maxim Raya,et al. The security of vehicular ad hoc networks , 2005, SASN '05.
[88] Roger Dingledine,et al. On the Economics of Anonymity , 2003, Financial Cryptography.
[89] Marco Gruteser,et al. Framework for security and privacy in automotive telematics , 2002, WMC '02.
[90] Glenn Shafer,et al. A Mathematical Theory of Evidence , 2020, A Mathematical Theory of Evidence.
[91] Michael Scott,et al. Implementing Cryptographic Pairings on Smartcards , 2006, CHES.
[92] Ratul Mahajan,et al. Experiences applying game theory to system design , 2004, PINS '04.
[93] Panagiotis Papadimitratos,et al. On Data-Centric Trust Establishment in Ephemeral Ad Hoc Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[94] W. Kinsner,et al. Multifractal modelling of radio transmitter transients for classification , 1997, IEEE WESCANEX 97 Communications, Power and Computing. Conference Proceedings.
[95] Panagiotis Papadimitratos,et al. Securing Vehicular Communications - Assumptions, Requirements, and Principles , 2006 .
[96] Virgil D. Gligor,et al. On Inter-Realm Authentication in Large Distributed Systems , 1993, J. Comput. Secur..
[97] Srdjan Capkun,et al. The security and privacy of smart vehicles , 2004, IEEE Security & Privacy Magazine.
[98] Moni Naor,et al. Privacy preserving auctions and mechanism design , 1999, EC '99.
[99] Jonathan K. Millen,et al. Efficient fault-tolerant certificate revocation , 2000, CCS.
[100] Kevin R. Fall,et al. A delay-tolerant network architecture for challenged internets , 2003, SIGCOMM '03.
[101] Petra Wohlmacher,et al. Digital certificates: a survey of revocation methods , 2000, MULTIMEDIA '00.
[102] Audun Jøsang,et al. An Algebra for Assessing Trust in Certification Chains , 1999, NDSS.
[103] Panagiotis Papadimitratos,et al. Fast Exclusion of Errant Devices from Vehicular Networks , 2008, 2008 5th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.