An Efficient Trust-Based Reputation Protocol for Wireless and Mobile Ad Hoc Networks: Proof and Correctness
暂无分享,去创建一个
[1] Li Gong,et al. Reasoning about belief in cryptographic protocols , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.
[2] Martín Abadi,et al. A logic of authentication , 1990, TOCS.
[3] Xin Sui,et al. Agent trust evaluation and team formation in heterogeneous organizations , 2007, AAMAS '07.
[4] Charles E. Perkins,et al. Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.
[5] Azzedine Boukerche. Handbook of Algorithms for Wireless Networking and Mobile Computing , 2005 .
[6] Françoise Sailhan,et al. Group management for mobile Ad Hoc networks: design, implementation and experiment , 2005, MDM '05.
[7] Panagiotis Papadimitratos,et al. Secure link state routing for mobile ad hoc networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..
[8] Patrick Lynch,et al. Why to market IT services and how to do it , 2002, SIGUCCS '02.
[9] James C. Browne,et al. Using uncertainty in reputation methods to enforce cooperation in ad-hoc networks , 2006, WiSe '06.
[10] Gerd Kortuem,et al. Disseminating Trust Information in Wearable Communities , 2000 .
[11] Azzedine Boukerche,et al. A novel solution based on mobile agent for anonymity in wireless and mobile ad hoc networks , 2007, Q2SWinet '07.
[12] Azzedine Boukerche,et al. Performance evaluation of an anonymity providing protocol for wireless ad hoc networks , 2006, Perform. Evaluation.
[13] Matthias Klusch,et al. Information agent technology for the Internet: A survey , 2001, Data Knowl. Eng..
[14] Victor C. M. Leung,et al. Secure Routing for Mobile Ad Hoc Networks , 2006 .