Trust in Pervasive Computing
暂无分享,去创建一个
Timothy W. Finin | Anupam Joshi | Jim Parker | Anand Patwardhan | Filip Perich | A. Joshi | A. Patwardhan | J. Parker | F. Perich
[1] Vaduvur Bharghavan,et al. MACAW: a media access protocol for wireless LAN's , 1994, SIGCOMM 1994.
[2] Joan Feigenbaum,et al. Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[3] Joan Feigenbaum,et al. REFEREE: Trust Management for Web Applications , 1997, Comput. Networks.
[4] M. Gerla,et al. GloMoSim: a library for parallel simulation of large-scale wireless networks , 1998, Proceedings. Twelfth Workshop on Parallel and Distributed Simulation PADS '98 (Cat. No.98TB100233).
[5] Stephen Hailes,et al. A distributed trust model , 1998, NSPW '97.
[6] J. Feigenbaum,et al. The KeyNote trust management system version2, IETF RFC 2704 , 1999 .
[7] Joan Feigenbaum,et al. The Role of Trust Management in Distributed Systems Security , 2001, Secure Internet Programming.
[8] Joan Feigenbaum,et al. The KeyNote Trust-Management System Version 2 , 1999, RFC.
[9] Catholijn M. Jonker,et al. Formal Analysis of Models for the Dynamics of Trust Based on Experiences , 1999, MAAMAW.
[10] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[11] Stanley B. Zdonik,et al. Expressing user profiles for data recharging , 2001, IEEE Wirel. Commun..
[12] Timothy W. Finin,et al. A Delegation Based Model for Distributed Trust , 2001 .
[13] Diana K. Smetters,et al. Talking to Strangers: Authentication in Ad-Hoc Wireless Networks , 2002, NDSS.
[14] Jean-Yves Le Boudec,et al. Nodes bearing grudges: towards routing security, fairness, and robustness in mobile ad hoc networks , 2002, Proceedings 10th Euromicro Workshop on Parallel, Distributed and Network-based Processing.
[15] John S. Baras,et al. On Trust Establishment in Mobile Ad-Hoc Networks , 2002, Security Protocols Workshop.
[16] Srdjan Capkun,et al. Self-Organized Public-Key Management for Mobile Ad Hoc Networks , 2003, IEEE Trans. Mob. Comput..
[17] Li Ding,et al. Trust based knowledge outsourcing for semantic Web agents , 2003, Proceedings IEEE/WIC International Conference on Web Intelligence (WI 2003).
[18] Timothy W. Finin,et al. A Policy Based Approach to Security for the Semantic Web , 2003, SEMWEB.
[19] William A. Arbaugh,et al. Bootstrapping security associations for routing in mobile ad-hoc networks , 2003, GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489).
[20] Stefan Schlott,et al. Securing ad hoc routing protocols , 2004, Proceedings. 30th Euromicro Conference, 2004..
[21] Bo Sun. Intrusion detection in mobile ad hoc networks , 2004 .
[22] Timothy W. Finin,et al. In reputation we believe: query processing in mobile ad-hoc networks , 2004, The First Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, 2004. MOBIQUITOUS 2004..
[23] Timothy W. Finin,et al. On data management in pervasive computing environments , 2004, IEEE Transactions on Knowledge and Data Engineering.
[24] Anupam Joshi,et al. On Intrusion Detection in Mobile Ad Hoc Networks , 2004 .
[25] Anupam Joshi,et al. Secure Routing and Intrusion Detection in Ad Hoc Networks , 2005, Third IEEE International Conference on Pervasive Computing and Communications.