Dependable Dynamic Source Routing without a Trusted Third Party
暂无分享,去创建一个
[1] Chris McDonald,et al. Establishing Trust In Pure Ad-hoc Networks , 2004, ACSC.
[2] Dawn Song,et al. The TESLA Broadcast Authentication Protocol , 2002 .
[3] Amitava Datta,et al. Trust-based routing for ad-hoc wireless networks , 2004, Proceedings. 2004 12th IEEE International Conference on Networks (ICON 2004) (IEEE Cat. No.04EX955).
[4] Chris McDonald,et al. Secure Routing Protocols for Mobile Ad-Hoc Wireless Networks , 2005 .
[5] Peter Kruus,et al. CONSTRAINTS AND APPROACHES FOR DISTRIBUTED SENSOR NETWORK SECURITY , 2000 .
[6] S. Carter. Secure Position Aided Ad Hoc Routing , 2003 .
[7] Edsger W. Dijkstra,et al. A note on two problems in connexion with graphs , 1959, Numerische Mathematik.
[8] Audun Jøsang,et al. A Logic for Uncertain Probabilities , 2001, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[9] Yih-Chun Hu,et al. Caching strategies in on-demand routing protocols for wireless ad hoc networks , 2000, MobiCom '00.
[10] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[11] Zygmunt J. Haas,et al. Securing ad hoc networks , 1999, IEEE Netw..
[12] Edward W. Knightly,et al. Denial of service resilience in ad hoc networks , 2004, MobiCom '04.
[13] A.A. Pirzada,et al. Deploying trust gateways to reinforce dynamic source routing , 2005, INDIN '05. 2005 3rd IEEE International Conference on Industrial Informatics, 2005..
[14] Yih-Chun Hu,et al. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2002, MobiCom '02.
[15] David B. Johnson,et al. The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks , 2003 .
[16] Chris McDonald,et al. Kerberos Assisted Authentication in Mobile Ad-hoc Networks , 2004, ACSC.
[17] Laura Marie Feeney,et al. An Energy Consumption Model for Performance Analysis of Routing Protocols for Mobile Ad Hoc Networks , 2001, Mob. Networks Appl..
[18] Stephen Hailes,et al. A distributed trust model , 1998, NSPW '97.
[19] Elizabeth M. Belding-Royer,et al. A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..
[20] Thomas Beth,et al. Valuation of Trust in Open Networks , 1994, ESORICS.
[21] Chris McDonald,et al. Secure Routing with the DSR Protocol , 2004, Wireless Information Systems.
[22] O. Kachirski,et al. Intrusion detection using mobile agents in wireless ad hoc networks , 2002, Proceedings. IEEE Workshop on Knowledge Media Networking.
[23] Elizabeth M. Belding-Royer,et al. A review of current routing protocols for ad hoc mobile wireless networks , 1999, IEEE Wirel. Commun..
[24] A.A. Pirzada,et al. Propagating trust in ad-hoc networks for reliable routing , 2004, International Workshop on Wireless Ad-Hoc Networks, 2004..
[25] Dorothy E. Denning,et al. A new paradigm for trusted systems , 1993, NSPW '92-93.
[26] Ernesto Damiani,et al. Security, Privacy, and Trust in Mobile Systems and Applications , 2005 .
[27] Lalit M. Patnaik,et al. An address assignment for the automatic configuration of mobile ad hoc networks , 2003, Personal and Ubiquitous Computing.