Trust model for certificate revocation in ad hoc networks
暂无分享,去创建一个
[1] Zhaoyu Liu,et al. A dynamic trust model for mobile ad hoc networks , 2004, Proceedings. 10th IEEE International Workshop on Future Trends of Distributed Computing Systems, 2004. FTDCS 2004..
[2] Julita Vassileva,et al. Bayesian Network-Based Trust Model in Peer-to-Peer Networks , 2003 .
[3] Charles E. Perkins,et al. Ad Hoc Networking , 2001 .
[4] Haiyun Luo,et al. Self-securing ad hoc wireless networks , 2002, Proceedings ISCC 2002 Seventh International Symposium on Computers and Communications.
[5] Timothy W. Finin,et al. Trust-Based Security in Pervasive Computing Environments , 2022 .
[6] Chung-wei Lee,et al. Trust based adaptive on demand ad hoc routing protocol , 2004, ACM-SE 42.
[7] Tracy Camp,et al. A survey of mobility models for ad hoc network research , 2002, Wirel. Commun. Mob. Comput..
[8] Lionel M. Ni,et al. Facilitating secure ad hoc service discovery in public environments , 2005, J. Syst. Softw..
[9] Chris McDonald,et al. Establishing Trust In Pure Ad-hoc Networks , 2004, ACSC.
[10] Joshua Wright,et al. Detecting Wireless LAN MAC Address Spoofing , 2003 .
[11] Robert H. Deng,et al. Highly reliable trust establishment scheme in ad hoc networks , 2004, Comput. Networks.
[12] Claude Crépeau,et al. A certificate revocation scheme for wireless ad hoc networks , 2003, SASN '03.
[13] Zheng Yan,et al. Trust Evaluation Based Security Solution in Ad Hoc Networks , 2003 .
[14] Timothy W. Finin,et al. Communications - Trust-Based Security in Pervasive Computing Environments , 2001, Computer.
[15] David A. Maltz,et al. DSR: the dynamic source routing protocol for multihop wireless ad hoc networks , 2001 .
[16] Dhananjay S. Phatak,et al. Preemptive routing in ad hoc networks , 2003, J. Parallel Distributed Comput..
[17] John S. Baras,et al. Trust evaluation in ad-hoc networks , 2004, WiSe '04.
[18] Giovanni Vigna,et al. An intrusion detection tool for AODV-based ad hoc wireless networks , 2004, 20th Annual Computer Security Applications Conference.
[19] Peter T. Kirstein,et al. Proactive seamless mobility management for future IP radio access networks , 2003, Comput. Commun..
[20] Jean-Yves Le Boudec,et al. The Effect of Rumor Spreading in Reputation Systems for Mobile Ad-hoc Networks , 2003 .
[21] Yuguang Fang,et al. Location-based compromise-tolerant security mechanisms for wireless sensor networks , 2006, IEEE Journal on Selected Areas in Communications.
[22] Licia Capra,et al. Engineering human trust in mobile system collaborations , 2004, SIGSOFT '04/FSE-12.