A guide to trust in mobile ad hoc networks
暂无分享,去创建一个
[1] Jean-Yves Le Boudec,et al. Nodes bearing grudges: towards routing security, fairness, and robustness in mobile ad hoc networks , 2002, Proceedings 10th Euromicro Workshop on Parallel, Distributed and Network-based Processing.
[2] Jean-Yves Le Boudec,et al. Self-policing mobile ad hoc networks by reputation systems , 2005, IEEE Communications Magazine.
[3] Levente Buttyán,et al. Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks , 2003, Mob. Networks Appl..
[4] Pietro Michiardi,et al. Making greed work in mobile ad hoc networks , 2002 .
[5] Leandros Tassiulas,et al. Overcoming misbehavior in mobile ad hoc networks: an overview , 2005, CROS.
[6] Mahmut T. Kandemir,et al. The Sleep Deprivation Attack in Sensor Networks: Analysis and Methods of Defense , 2006, Int. J. Distributed Sens. Networks.
[7] Frank Stajano,et al. The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks , 1999, Security Protocols Workshop.
[8] S. Buchegger,et al. A Robust Reputation System for P2P and Mobile Ad-hoc Networks , 2004 .
[9] Rudolf Avenhaus. Game Theoretical Analysis , 1986 .
[10] Jolyon Clulow,et al. New Strategies for Revocation in Ad-Hoc Networks , 2007, ESAS.
[11] Pietro Michiardi,et al. Prevention of denial of service attacks and selfishness in mobile ad hoc networks , 2002 .
[12] A. Perrig,et al. The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[13] Audun J sang,et al. An Algebra for Assessing Trust in Certi cation Chains , 1998 .
[14] V. Sdralia,et al. Towards the security of routing in ad hoc networks , 2004 .
[15] Yih-Chun Hu,et al. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2005, Wirel. Networks.
[16] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[17] Sheng Zhong,et al. Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[18] Luís E. T. Rodrigues,et al. Friends and foes: preventing selfishness in open mobile ad hoc networks , 2003, 23rd International Conference on Distributed Computing Systems Workshops, 2003. Proceedings..
[19] Jeremy V. Pitt,et al. Reinventing Forgiveness: A Formal Investigation of Moral Facilitation , 2005, iTrust.
[20] Bruce Christianson,et al. Revised Papers from the 9th International Workshop on Security Protocols , 2000 .
[21] Zygmunt J. Haas,et al. Securing ad hoc networks , 1999, IEEE Netw..
[22] N. L. Chervany,et al. THE MEANINGS OF TRUST , 2000 .
[23] Helmut Kurth,et al. Certifying open source - the Linux experience , 2004, IEEE Security & Privacy Magazine.
[24] Patrick Th. Eugster,et al. DICTATE: DIstributed CerTification Authority with probabilisTic frEshness for ad hoc networks , 2005, IEEE Transactions on Dependable and Secure Computing.
[25] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[26] Jean-Pierre Hubaux,et al. The quest for security in mobile ad hoc networks , 2001, MobiHoc '01.
[27] Guang Gong,et al. Bootstrapping Security in Mobile Ad Hoc Networks Using Identity-Based Schemes with Key Revocation , 2006 .
[28] Svein J. Knapskog,et al. A metric for trusted systems , 1998 .
[29] Norman L. Chervany,et al. Trust and Distrust Definitions: One Bite at a Time , 2000, Trust in Cyber-societies.
[30] Adrian Perrig,et al. Distributed detection of node replication attacks in sensor networks , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[31] Baruch Awerbuch,et al. An on-demand secure routing protocol resilient to byzantine failures , 2002, WiSE '02.
[32] Stephan Eidenbenz,et al. Ad hoc-VCG: a truthful and cost-efficient routing protocol for mobile ad hoc networks with selfish agents , 2003, MobiCom '03.
[33] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[34] Stephan Eichler,et al. Performance analysis of scalable certificate revocation schemes for ad hoc networks , 2005, The IEEE Conference on Local Computer Networks 30th Anniversary (LCN'05)l.
[35] Yuguang Fang,et al. AC-PKI: anonymous and certificateless public-key infrastructure for mobile ad hoc networks , 2005, IEEE International Conference on Communications, 2005. ICC 2005. 2005.
[36] Audun Jøsang,et al. An Algebra for Assessing Trust in Certification Chains , 1999, NDSS.
[37] Siu-Ming Yiu,et al. Performance evaluation on CRL distribution using flooding in mobile ad hoc networks (MANETs) , 2005, ACM-SE 43.
[38] Paul F. Syverson,et al. Anonymous connections and onion routing , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).
[39] Jean-Yves Le Boudec,et al. Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.
[40] Chris J. Mitchell,et al. Reputation methods for routing security for mobile ad hoc networks , 2003, SympoTIC'03. Joint 1st Workshop on Mobile Future and Symposium on Trends in Communications.
[41] Jolyon Clulow,et al. Suicide for the common good: a new strategy for credential revocation in self-organizing systems , 2006, OPSR.
[42] Qi He,et al. SORI: a secure and objective reputation-based incentive scheme for ad-hoc networks , 2004, 2004 IEEE Wireless Communications and Networking Conference (IEEE Cat. No.04TH8733).
[43] B.J. Matt. Toward hierarchical identity-based cryptography for tactical networks , 2004, IEEE MILCOM 2004. Military Communications Conference, 2004..
[44] Daniel R. Simon,et al. Secure traceroute to detect faulty or malicious routing , 2003, CCRV.
[45] Audun Jøsang,et al. A Security Architecture for Reputation Systems , 2003, EC-Web.
[46] Frank Stajano,et al. The Resurrecting Duckling - What Next? , 2000, Security Protocols Workshop.
[47] Haiyun Luo,et al. Self-securing ad hoc wireless networks , 2002, Proceedings ISCC 2002 Seventh International Symposium on Computers and Communications.
[48] Yih-Chun Hu,et al. Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[49] Claudia Keser,et al. Can We Manage Trust? , 2005, iTrust.
[50] Stephen Marsh,et al. Trust, Untrust, Distrust and Mistrust - An Exploration of the Dark(er) Side , 2005, iTrust.
[51] Ross J. Anderson. Security engineering - a guide to building dependable distributed systems (2. ed.) , 2001 .
[52] Diana K. Smetters,et al. Talking to Strangers: Authentication in Ad-Hoc Wireless Networks , 2002, NDSS.
[53] Alex C. Snoeren,et al. Priority Forwarding in Ad Hoc Networks with Self-Interested Parties , 2003 .
[54] Refik Molva,et al. Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.
[55] ClulowJolyon,et al. Suicide for the common good , 2006 .
[56] Jean Bacon,et al. Trust for Ubiquitous, Transparent Collaboration , 2004, Wirel. Networks.
[57] Stephen Hailes,et al. Supporting trust in virtual communities , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.
[58] Yih-Chun Hu,et al. A survey of secure wireless ad hoc routing , 2004, IEEE Security & Privacy Magazine.
[59] Paul Resnick,et al. Reputation systems , 2000, CACM.
[60] Audun Jøsang,et al. A survey of trust and reputation systems for online service provision , 2007, Decis. Support Syst..
[61] Yih-Chun Hu,et al. Rushing attacks and defense in wireless ad hoc network routing protocols , 2003, WiSe '03.
[62] Timothy W. Finin,et al. Trust-Based Security in Pervasive Computing Environments , 2022 .
[63] Levente Buttyán,et al. Security and Cooperation in Wireless Networks: Thwarting Malicious and Selfish Behavior in the Age of Ubiquitous Computing , 2007 .
[64] Claude Crépeau,et al. A certificate revocation scheme for wireless ad hoc networks , 2003, SASN '03.
[65] Paul Resnick,et al. Trust among strangers in internet transactions: Empirical analysis of eBay' s reputation system , 2002, The Economics of the Internet and E-commerce.
[66] Marco Conti,et al. Cooperation issues in mobile ad hoc networks , 2004, 24th International Conference on Distributed Computing Systems Workshops, 2004. Proceedings..
[67] Dirk Westhoff,et al. Context aware detection of selfish nodes in DSR based ad-hoc networks , 2002, Global Telecommunications Conference, 2002. GLOBECOM '02. IEEE.
[68] Lik Mui,et al. Notions of reputation in multi-agents systems: a review , 2002, AAMAS '02.
[69] Stephen Marsh,et al. Examining Trust, Forgiveness and Regret as Computational Concepts , 2009, Computing with Social Trust.
[70] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..
[71] Marco Conti,et al. Towards Reliable Forwarding for Ad Hoc Networks , 2003, PWC.
[72] Christian Damsgaard Jensen,et al. Towards a Framework for Assessing Trust-Based Admission Control in Collaborative Ad Hoc Applications , 2002 .
[73] Jean-Yves Le Boudec,et al. Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.
[74] Audun Jøsang,et al. The right type of trust for distributed systems , 1996, NSPW '96.
[75] Jean-Yves Le Boudec,et al. Self-Policing Mobile Ad Hoc Networks , 2004, Mobile Computing Handbook.
[76] J.-P. Hubaux,et al. Enforcing service availability in mobile ad-hoc WANs , 2000, 2000 First Annual Workshop on Mobile and Ad Hoc Networking and Computing. MobiHOC (Cat. No.00EX444).
[77] Stephen Hailes,et al. A distributed trust model , 1998, NSPW '97.
[78] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[79] M. Bansal,et al. Mobile Ad hoc Networking ( MANET ) : Routing Protocol Performance Issues and Evaluation Considerations , 2010 .