A Trust-based Middleware for Providing Security to Ad-Hoc Peer-to-Peer Applications
暂无分享,去创建一个
Andrés Marín López | Florina Almenárez | Daniel Díaz Sánchez | Carlos García-Rubio | Celeste Campo | Alberto Cortés
[1] Audun Jøsang,et al. An Algebra for Assessing Trust in Certification Chains , 1999, NDSS.
[2] Vana Kalogeraki,et al. Decentralized trust management for ad-hoc peer-to-peer networks , 2006, MPAC '06.
[3] Julita Vassileva,et al. Trust and reputation model in peer-to-peer networks , 2003, Proceedings Third International Conference on Peer-to-Peer Computing (P2P2003).
[4] Liwen He. A Novel Scheme on Building a Trusted IP Routing Infrastructure , 2006, International conference on Networking and Services (ICNS'06).
[5] Yong Chen,et al. Using Trust for Secure Collaboration in Uncertain Environments , 2003, IEEE Pervasive Comput..
[6] Zheng Yan,et al. Trust Evaluation Based Security Solution in Ad Hoc Networks , 2003 .
[7] Florina Almenárez,et al. PDP: A lightweight discovery protocol for local-scope interactions in wireless ad hoc networks , 2006, Comput. Networks.
[8] Celeste Campo,et al. PTM: A Pervasive Trust Management Model for Dynamic Open Environments ⁄ , 2003 .
[9] Srdjan Capkun,et al. Self-Organized Public-Key Management for Mobile Ad Hoc Networks , 2003, IEEE Trans. Mob. Comput..
[10] Andrés Marín López,et al. Developing a model for trust management in pervasive devices , 2006, Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW'06).
[11] Timothy W. Finin,et al. Active collaborations for trustworthy data management in ad hoc networks , 2005, IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005..
[12] Tao Jiang,et al. Cooperative games, phase transitions on graphs and distributed trust in MANET , 2004, 2004 43rd IEEE Conference on Decision and Control (CDC) (IEEE Cat. No.04CH37601).
[13] Stephen Perelson. An Investigation Into Access Control For Mobile Devices , 2004, ISSA.
[14] Hector Garcia-Molina,et al. The Eigentrust algorithm for reputation management in P2P networks , 2003, WWW '03.
[15] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.