A Dynamic Trust Framework for Opportunistic Mobile Social Networks
暂无分享,去创建一个
Siu-Ming Yiu | Yunming Ye | Yueping Li | Eric Ke Wang | Lucas C. K. Hui | L. Hui | S. Yiu | Yunming Ye | E. Wang | Yueping Li
[1] Luigi Atzori,et al. Trustworthiness Management in the Social Internet of Things , 2014, IEEE Transactions on Knowledge and Data Engineering.
[2] Isaac Woungang,et al. Trust management in ubiquitous computing: A Bayesian approach , 2011, Comput. Commun..
[3] Marco Conti,et al. Implementation of CAMEO: A context-aware middleware for Opportunistic Mobile Social Networks , 2011, 2011 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks.
[4] Djamal Zeghlache,et al. Trust management system design for the Internet of Things: A context-aware and multi-service approach , 2013, Comput. Secur..
[5] Xin Wang,et al. Secure Routing Based on Social Similarity in Opportunistic Networks , 2016, IEEE Transactions on Wireless Communications.
[6] Hector Garcia-Molina,et al. The Eigentrust algorithm for reputation management in P2P networks , 2003, WWW '03.
[7] John C. S. Lui,et al. Epidemic Attacks in Network-Coding-Enabled Wireless Mesh Networks: Detection, Identification, and Evaluation , 2013, IEEE Transactions on Mobile Computing.
[8] Guiran Chang,et al. TRM-IoT: A trust management model based on fuzzy reputation for internet of things , 2011, Comput. Sci. Inf. Syst..
[9] Munindar P. Singh,et al. A Social Mechanism of Reputation Management in Electronic Communities , 2000, CIA.
[10] S. Sharma,et al. Detection of malicious attack in MANET a behavioral approach , 2013, 2013 3rd IEEE International Advance Computing Conference (IACC).
[11] Ling Liu,et al. Socialtrust: tamper-resilient trust establishment in online communities , 2008, JCDL '08.
[12] Audun Jøsang,et al. Dirichlet Reputation Systems , 2007, The Second International Conference on Availability, Reliability and Security (ARES'07).
[13] Rakesh Ranjan,et al. Security issues of black hole attacks in MANET , 2015, International Conference on Computing, Communication & Automation.
[14] Jin-Hee Cho,et al. Dynamic Trust Management for Delay Tolerant Networks and Its Application to Secure Routing , 2014, IEEE Transactions on Parallel and Distributed Systems.
[15] Jie Wu,et al. Thwarting Blackhole Attacks in Disruption-Tolerant Networks using Encounter Tickets , 2009, IEEE INFOCOM 2009.
[16] Neeli R. Prasad,et al. A fuzzy approach to trust based access control in internet of things , 2013, Wireless VITAE 2013.
[17] Thomas Beth,et al. Trust-Based Navigation in Distribution Systems , 1994, Comput. Syst..
[18] Ling Liu,et al. PeerTrust: supporting reputation-based trust for peer-to-peer electronic communities , 2004, IEEE Transactions on Knowledge and Data Engineering.
[19] Kyumin Lee,et al. SocialTrust++: Building community-based trust in Social Information Systems , 2010, 6th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2010).
[20] Munindar P. Singh,et al. Trust and reputation management in a small-world network , 2000, Proceedings Fourth International Conference on MultiAgent Systems.
[21] Kun Wang,et al. Trust control in heterogeneous networks for Internet of Things , 2010, 2010 International Conference on Computer Application and System Modeling (ICCASM 2010).
[22] Wu Quan-yuan,et al. Robust Feedback Credibility-Based Distributed P2P Trust Model , 2009 .
[23] Kai Hwang,et al. PowerTrust: A Robust and Scalable Reputation System for Trusted Peer-to-Peer Computing , 2007, IEEE Transactions on Parallel and Distributed Systems.
[24] Thomas Beth,et al. Valuation of Trust in Open Networks , 1994, ESORICS.