A Node-based Trust Management Scheme for Mobile Ad-Hoc Networks
暂无分享,去创建一个
Abdul Sattar | Vallipuram Muthukkumarasamy | Raihana Ferdous | A. Sattar | Raihana Ferdous | V. Muthukkumarasamy
[1] Wenke Lee,et al. A cooperative intrusion detection system for ad hoc networks , 2003, SASN '03.
[2] John C. Mitchell,et al. Formal Proofs of Cryptographic Security of Diffie-Hellman-Based Protocols , 2007, TGC.
[3] David A. Maltz,et al. Dynamic Source Routing in Ad Hoc Wireless Networks , 1994, Mobidata.
[4] Thomas Beth,et al. Valuation of Trust in Open Networks , 1994, ESORICS.
[5] Diana K. Smetters,et al. Talking to Strangers: Authentication in Ad-Hoc Wireless Networks , 2002, NDSS.
[6] Shambhu Upadhyaya,et al. Securing Information through Trust Management in Wireless Networks , 2004 .
[7] David B. Johnson,et al. Routing in Ad Hoc Networks of Mobile Hosts , 1994, 1994 First Workshop on Mobile Computing Systems and Applications.
[8] Stephen Hailes,et al. A distributed trust model , 1998, NSPW '97.
[9] Carlton R. Davis. A localized trust management scheme for ad hoc networks , 2004 .
[10] Jean-Yves Le Boudec,et al. Nodes bearing grudges: towards routing security, fairness, and robustness in mobile ad hoc networks , 2002, Proceedings 10th Euromicro Workshop on Parallel, Distributed and Network-based Processing.
[11] John S. Baras,et al. On Trust Establishment in Mobile Ad-Hoc Networks , 2002, Security Protocols Workshop.
[12] Zygmunt J. Haas,et al. Securing ad hoc networks , 1999, IEEE Netw..
[13] Boi Faltings,et al. An incentive compatible reputation mechanism , 2003, EEE International Conference on E-Commerce, 2003. CEC 2003..
[14] Mukesh Singhal,et al. Trust Management in Distributed Systems , 2007, Computer.
[15] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[16] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[17] Julita Vassileva,et al. Trust and reputation model in peer-to-peer networks , 2003, Proceedings Third International Conference on Peer-to-Peer Computing (P2P2003).
[18] Abdul Sattar,et al. Trust Management Scheme for Mobile Ad-Hoc Networks , 2010, 2010 10th IEEE International Conference on Computer and Information Technology.
[19] Valérie Issarny,et al. Enhanced Reputation Mechanism for Mobile Ad Hoc Networks , 2004, iTrust.
[20] G. G. Stokes. "J." , 1890, The New Yale Book of Quotations.
[21] Stephen Hailes,et al. Supporting trust in virtual communities , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.
[22] S. Buchegger,et al. A Robust Reputation System for P2P and Mobile Ad-hoc Networks , 2004 .
[23] Wang Heng-jun. Routing in AD HOC Networks of Mobile Hosts , 2002 .
[24] Abdul Sattar,et al. Trust Formalization in Mobile Ad-Hoc Networks , 2010, 2010 IEEE 24th International Conference on Advanced Information Networking and Applications Workshops.
[25] Ruidong Li,et al. Future trust management framework for mobile ad hoc networks , 2008, IEEE Communications Magazine.
[26] Todd Hughes,et al. Dynamic Trust Applied to Ad Hoc Network Resources , 2003 .
[27] Mostafa H. Ammar,et al. A reputation system for peer-to-peer networks , 2003, NOSSDAV '03.
[28] R. Bellman. A Markovian Decision Process , 1957 .
[29] Hector Garcia-Molina,et al. The Eigentrust algorithm for reputation management in P2P networks , 2003, WWW '03.