Trust based D2D communications for accessing services in Internet of Things
暂无分享,去创建一个
[1] Gary Carpenter. 동적 사용자를 위한 Scalable 인증 그룹 키 교환 프로토콜 , 2005 .
[2] Dave Evans,et al. How the Next Evolution of the Internet Is Changing Everything , 2011 .
[3] Jia Guo,et al. Scalable, adaptive and survivable trust management for community of interest based Internet of Things systems , 2013, 2013 IEEE Eleventh International Symposium on Autonomous Decentralized Systems (ISADS).
[4] Lv Tingjie,et al. Real-time business network selection based on auction mechanism , 2014, China Communications.
[5] Guiran Chang,et al. TRM-IoT: A trust management model based on fuzzy reputation for internet of things , 2011, Comput. Sci. Inf. Syst..
[6] M. Ufuk Çaglayan,et al. Extracting trust information from security system of a service , 2012, J. Netw. Comput. Appl..
[8] Kun Wang,et al. Trust control in heterogeneous networks for Internet of Things , 2010, 2010 International Conference on Computer Application and System Modeling (ICCASM 2010).
[9] Sateesh Addepalli,et al. Fog computing and its role in the internet of things , 2012, MCC '12.
[10] Kevin Barraclough,et al. I and i , 2001, BMJ : British Medical Journal.
[11] Zhu Han,et al. Defense of trust management vulnerabilities in distributed networks , 2008, IEEE Communications Magazine.
[12] Ivan Stojmenovic,et al. The Fog computing paradigm: Scenarios and security issues , 2014, 2014 Federated Conference on Computer Science and Information Systems.
[13] Ing-Ray Chen,et al. Trust management for the internet of things and its application to service composition , 2012, 2012 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM).
[14] Marimuthu Palaniswami,et al. Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..
[15] Bin Sun,et al. Trust management mechanism for Internet of Things , 2014 .
[16] Gu Li-ze,et al. Trust management mechanism for Internet of Things , 2014, China Communications.
[17] Joan Feigenbaum,et al. Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[18] Paolo Massa,et al. A Survey of Trust Use and Modeling in Real Online Systems , 2007 .
[19] G. G. Stokes. "J." , 1890, The New Yale Book of Quotations.
[20] Luigi Atzori,et al. Trustworthiness Management in the Social Internet of Things , 2014, IEEE Transactions on Knowledge and Data Engineering.
[21] Athanasios V. Vasilakos,et al. A survey on trust management for Internet of Things , 2014, J. Netw. Comput. Appl..
[22] Zhao Wang,et al. Access Control Mechanism Based on Trust Quantification , 2010, 2010 IEEE Second International Conference on Social Computing.