A Multi-Parameter Trust Framework for Mobile Ad Hoc Networks
暂无分享,去创建一个
[1] Peng Liu,et al. An Objective Trust Management Framework for Mobile Ad Hoc Networks , 2007, 2007 IEEE 65th Vehicular Technology Conference - VTC2007-Spring.
[2] Stephen Hailes,et al. A distributed trust model , 1998, NSPW '97.
[3] Mukesh Singhal,et al. Trust Management in Distributed Systems , 2007, Computer.
[4] Emil C. Lupu,et al. The Ponder Policy Specification Language , 2001, POLICY.
[5] Ji Guo,et al. A Trust Management Framework for Detecting Malicious and Selfish Behaviour in Ad-Hoc Wireless Networks Using Fuzzy Sets and Grey Theory , 2011, IFIPTM.
[6] María Teresa Lamata,et al. Consistency in the Analytic Hierarchy Process: a New Approach , 2006, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[7] Baoyi Wang,et al. A Novel Grid Trust Model Based on Fuzzy Theory , 2009, 2009 Third International Conference on Network and System Security.
[8] Yi Chen,et al. A Fuzzy Trust Evaluation Based Access Control in Grid Environment , 2008, The Third ChinaGrid Annual Conference (chinagrid 2008).
[9] Zhu Han,et al. Information theoretic framework of trust modeling and evaluation for ad hoc networks , 2006, IEEE Journal on Selected Areas in Communications.
[10] Konstantinos G. Kyriakopoulos,et al. An on-line wireless attack detection system using multi-layer data fusion , 2011, 2011 IEEE International Workshop on Measurements and Networking Proceedings (M&N).
[11] John S. Baras,et al. On Trust Establishment in Mobile Ad-Hoc Networks , 2002, Security Protocols Workshop.
[12] Mani B. Srivastava,et al. Reputation-based framework for high integrity sensor networks , 2008, TOSN.
[13] Morris Sloman,et al. A survey of trust in internet applications , 2000, IEEE Communications Surveys & Tutorials.
[14] K.E. Seamons,et al. Automated trust negotiation , 2000, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.
[15] Mowafa Househ,et al. Social Media and Mobile Technologies for Healthcare , 2014 .
[16] Leonie Ellis,et al. The Past, the Present, and the Future: Examining the Role of the “Social” in Transforming Personal Healthcare Management of Chronic Disease , 2014 .
[17] ABBAS JAMALIPOUR,et al. Network selection in an integrated wireless LAN and UMTS environment using mathematical modeling and computing techniques , 2005, IEEE Wireless Communications.
[18] Dhananjay Singh,et al. Design and Performance Evaluation of a Proactive Micro Mobility Protocol for Mobile Networks , 2010 .
[19] Ruidong Li,et al. Future trust management framework for mobile ad hoc networks , 2008, IEEE Communications Magazine.
[20] Joan Feigenbaum,et al. REFEREE: Trust Management for Web Applications , 1997, Comput. Networks.
[21] J. Deng,et al. Introduction to Grey system theory , 1989 .
[22] Trinh Anh Tuan. A Game-Theoretic Analysis of Trust Management in P2P Systems , 2006, 2006 First International Conference on Communications and Electronics.
[23] Joseph P. Macker,et al. Mobile Ad hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations , 1999, RFC.
[24] W. Poortinga,et al. Trust, the Asymmetry Principle, and the Role of Prior Beliefs , 2004, Risk analysis : an official publication of the Society for Risk Analysis.
[25] Thomas L. Saaty,et al. DECISION MAKING WITH THE ANALYTIC HIERARCHY PROCESS , 2008 .
[26] Junzhou Luo,et al. A Clustering Analysis Based Trust Model in Grid Environment Supporting Virtual Organizations , 2008, 22nd International Conference on Advanced Information Networking and Applications - Workshops (aina workshops 2008).
[27] Liu Chen,et al. Notice of RetractionA Subjective Trust Model Based on Two-Dimensional Measurement , 2009, 2009 International Conference on Computer Engineering and Technology.
[28] Tao Limin,et al. Research of subjective trust comprehensive evaluation model based on multi-element connection number , 2010, The 2nd International Conference on Information Science and Engineering.
[29] Jean-Yves Le Boudec,et al. Self-policing mobile ad hoc networks by reputation systems , 2005, IEEE Communications Magazine.
[30] Liu Ming,et al. Grey Theory Based Nodes Risk Assessment in P2P Networks , 2009, 2009 IEEE International Symposium on Parallel and Distributed Processing with Applications.
[31] Zhiping Jia,et al. Fuzzy Dynamic Programming Based Trusted Routing Decision in Mobile Ad Hoc Networks , 2008, 2008 Fifth IEEE International Symposium on Embedded Computing.
[32] Zhu Han,et al. Defense of trust management vulnerabilities in distributed networks , 2008, IEEE Communications Magazine.
[33] Frank Stajano,et al. The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks , 1999, Security Protocols Workshop.
[34] Jerzy Konorski,et al. Data-Centric Dempster-Shafer Theory-Based Selfishness Thwarting via Trust Evaluation in MANETs and WSNs , 2009, 2009 3rd International Conference on New Technologies, Mobility and Security.
[35] Richa Singh,et al. Dempster-Shafer Theory Based Classifier Fusion for Improved Fingerprint Verification Performance , 2006, ICVGIP.
[36] Angelos D. Keromytis,et al. Key note: Trust management for public-key infrastructures , 1999 .
[37] Morris Sloman,et al. Specifying and Analysing Trust for Internet Applications , 2002, I3E.
[38] Coye Cheshire,et al. The Emergence of Trust Networks under Uncertainty – Implications for Internet Interactions , 2004 .