Trust establishment in cooperative wireless relaying networks
暂无分享,去创建一个
[1] Chuang Lin,et al. Game-Based Trust Establishment for Mobile Ad Hoc Networks , 2009, 2009 WRI International Conference on Communications and Mobile Computing.
[2] Raviraj S. Adve,et al. Selection cooperation in multi-source cooperative networks , 2008, IEEE Transactions on Wireless Communications.
[3] Licia Capra. Towards a human trust model for mobile ad-hoc networks , 2004 .
[4] Ben-Jye Chang,et al. Markov Chain Trust Model for Trust-Value Analysis and Key Management in Distributed Multicast MANETs , 2009, IEEE Transactions on Vehicular Technology.
[5] Min Wu,et al. Tracing Malicious Relays in Cooperative Wireless Communications , 2007, IEEE Transactions on Information Forensics and Security.
[6] Thanasis Korakis,et al. Security Implications of Cooperative Communications in Wireless Networks , 2008, 2008 IEEE Sarnoff Symposium.
[7] F. Richard Yu,et al. Distributed node selection for threshold key management with intrusion detection in mobile ad hoc networks , 2010, Wirel. Networks.
[8] Michael Gastpar,et al. Cooperative strategies and capacity theorems for relay networks , 2005, IEEE Transactions on Information Theory.
[9] Min Wu,et al. Security Issues in Cooperative Communications: Tracing Adversarial Relays , 2006, 2006 IEEE International Conference on Acoustics Speech and Signal Processing Proceedings.
[10] Azzedine Boukerche,et al. Joint authentication and quality of service provisioning in cooperative communication networks , 2012, Comput. Commun..
[11] F. Richard Yu,et al. Distributed Optimal Relay Selection in Wireless Cooperative Networks With Finite-State Markov Channels , 2010, IEEE Transactions on Vehicular Technology.
[12] Klaus Wehrle,et al. ALPHA: an adaptive and lightweight protocol for hop-by-hop authentication , 2008, CoNEXT '08.
[13] Gregory W. Wornell,et al. Cooperative diversity in wireless networks: Efficient protocols and outage behavior , 2004, IEEE Transactions on Information Theory.
[14] Vijay Varadharajan,et al. Context-Aware Trust Management for Peer-to-Peer Mobile Ad-Hoc Networks , 2009, 2009 33rd Annual IEEE International Computer Software and Applications Conference.
[15] Wei Yu,et al. Joint optimization of relay strategies and resource allocations in cooperative cellular networks , 2006, IEEE Journal on Selected Areas in Communications.
[16] Ioannis Lambadaris,et al. Trust Management in Wireless Mobile Networks with Cooperative Communications , 2010, 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing.
[17] Nasir D. Memon,et al. Detecting Malicious Behavior in Cooperative Diversity , 2007, 2007 41st Annual Conference on Information Sciences and Systems.
[18] Brian L. Mark,et al. A quantitative trust establishment framework for reliable data packet delivery in MANETs , 2005, SASN '05.
[19] Aylin Yener,et al. Two-Hop Secure Communication Using an Untrusted Relay: A Case for Cooperative Jamming , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.
[20] Halim Yanikomeroglu,et al. Relayer selection strategies in cellular networks with peer-to-peer relaying , 2003, 2003 IEEE 58th Vehicular Technology Conference. VTC 2003-Fall (IEEE Cat. No.03CH37484).
[21] Zhu Han,et al. Distributed Relay Selection and Power Control for Multiuser Cooperative Communication Networks Using Stackelberg Game , 2009, IEEE Transactions on Mobile Computing.
[22] H. Vincent Poor,et al. Threshold Based Relay Selection in Cooperative Wireless Networks , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.
[23] Daniele Quercia,et al. B-Trust: Bayesian Trust Framework for Pervasive Computing , 2006, iTrust.
[24] Peter Xiaoping Liu,et al. Distributed Combined Authentication and Intrusion Detection With Data Fusion in High-Security Mobile Ad Hoc Networks , 2010, IEEE Transactions on Vehicular Technology.
[25] Suhas N. Diggavi,et al. On Cooperative Wireless Network Secrecy , 2009, IEEE INFOCOM 2009.
[26] J. Berger. Statistical Decision Theory and Bayesian Analysis , 1988 .
[27] Ioannis Lambadaris,et al. Throughput-optimal relay selection in multiuser cooperative relaying networks , 2010, 2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE.
[28] K. J. Ray Liu,et al. Cooperative communications with relay-selection: when to cooperate and whom to cooperate with? , 2008, IEEE Transactions on Wireless Communications.
[29] Zhu Han,et al. Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.
[30] Ioannis Lambadaris,et al. Trust establishment in cooperative wireless networks , 2010, 2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE.
[31] S. Buchegger,et al. A Robust Reputation System for P2P and Mobile Ad-hoc Networks , 2004 .
[32] H. Kuhn. The Hungarian method for the assignment problem , 1955 .
[33] Nasir D. Memon,et al. A Stochastic Model for Misbehaving Relays in Cooperative Diversity , 2008, 2008 IEEE Wireless Communications and Networking Conference.
[34] Jie Liu,et al. Optimal combined intrusion detection and biometric-based continuous authentication in high security mobile ad hoc networks , 2009, IEEE Transactions on Wireless Communications.
[35] Elza Erkip,et al. User cooperation diversity. Part I. System description , 2003, IEEE Trans. Commun..
[36] Ralph C. Merkle,et al. A Certified Digital Signature , 1989, CRYPTO.