A security management scheme using a novel computational reputation model for wireless and mobile ad hoc networks
暂无分享,去创建一个
[1] Azzedine Boukerche,et al. Performance evaluation of an anonymity providing protocol for wireless ad hoc networks , 2006, Perform. Evaluation.
[2] Sheng Zhong,et al. Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[3] Muthucumaru Maheswaran,et al. A secured hierarchical trust management framework for public computing utilities , 2005, CASCON.
[4] Françoise Sailhan,et al. Group management for mobile Ad Hoc networks: design, implementation and experiment , 2005, MDM '05.
[5] Paolo Santi,et al. A framework for incentive compatible topology control in non-cooperative wireless multi-hop networks , 2006, DIWANS '06.
[6] Ioanis Nikolaidis,et al. Certain limitations of reputation--based schemes in mobile environments , 2005, MSWiM '05.
[7] Narayan B. Mandayam,et al. Pricing for enabling forwarding in self-configuring ad hoc networks , 2004, 2004 IEEE Wireless Communications and Networking Conference (IEEE Cat. No.04TH8733).
[8] R. Srikant,et al. DARWIN: distributed and adaptive reputation mechanism for wireless ad-hoc networks , 2007, MobiCom '07.
[9] Ala I. Al-Fuqaha,et al. A new fuzzy-based cooperative movement model in support of qos in wireless ad-hoc network , 2007, IWCMC.
[10] David A. Maltz,et al. A performance comparison of multi-hop wireless ad hoc network routing protocols , 1998, MobiCom '98.
[11] Azzedine Boukerche,et al. Modeling and Managing the Trust for Wireless and Mobile Ad Hoc Networks , 2008, 2008 IEEE International Conference on Communications.
[12] Ersin Uzun,et al. A reputation-based trust management system for P2P networks , 2004, IEEE International Symposium on Cluster Computing and the Grid, 2004. CCGrid 2004..
[13] Patrick Lynch,et al. Why to market IT services and how to do it , 2002, SIGUCCS '02.
[14] Partha Dasgupta,et al. Trusting routers and relays in ad hoc networks , 2003, 2003 International Conference on Parallel Processing Workshops, 2003. Proceedings..
[15] Matthias Klusch,et al. Information agent technology for the Internet: A survey , 2001, Data Knowl. Eng..
[16] Ling Liu,et al. TrustMe: anonymous management of trust relationships in decentralized P2P systems , 2003, Proceedings Third International Conference on Peer-to-Peer Computing (P2P2003).
[17] Nima Haghpanah,et al. Trusted secure routing for ad hoc networks , 2007, MobiWac '07.
[18] James C. Browne,et al. Using uncertainty in reputation methods to enforce cooperation in ad-hoc networks , 2006, WiSe '06.
[19] B. Krishnamachari,et al. A price-based reliable routing game in wireless networks , 2006, International ICST Conference on Game Theory for Networks.
[20] Xin Sui,et al. Agent trust evaluation and team formation in heterogeneous organizations , 2007, AAMAS '07.
[21] R. Srikant,et al. Achieving cooperation in multihop wireless networks of selfish nodes , 2006, GameNets '06.
[22] Gerd Kortuem,et al. Disseminating trust information in wearable communities , 2006, Personal Technologies.
[23] Azzedine Boukerche,et al. ARMA: An Efficient Secure Ad Hoc Routing Protocol , 2007, IEEE GLOBECOM 2007 - IEEE Global Telecommunications Conference.
[24] Tian He,et al. SIGF: a family of configurable, secure routing protocols for wireless sensor networks , 2006, SASN '06.
[25] Mani B. Srivastava,et al. Reputation-based framework for high integrity sensor networks , 2004, SASN '04.
[26] Charles E. Perkins,et al. Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.