Trust Evaluation in Anarchy: A Case Study on Autonomous Networks
暂无分享,去创建一个
[1] 西森 秀稔. Statistical physics of spin glasses and information processing : an introduction , 2001 .
[2] Joan Feigenbaum,et al. Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[3] Ling Liu,et al. PeerTrust: supporting reputation-based trust for peer-to-peer electronic communities , 2004, IEEE Transactions on Knowledge and Data Engineering.
[4] Jean-Yves Le Boudec,et al. The Effect of Rumor Spreading in Reputation Systems for Mobile Ad-hoc Networks , 2003 .
[5] Ueli Maurer,et al. Modelling a Public-Key Infrastructure , 1996, ESORICS.
[6] H. Nishimori. Statistical Physics of Spin Glasses and Information Processing , 2001 .
[7] Duncan J. Watts,et al. Collective dynamics of ‘small-world’ networks , 1998, Nature.
[8] John S. Baras,et al. Trust evaluation in ad-hoc networks , 2004, WiSe '04.
[9] David R. Karger,et al. Chord: a scalable peer-to-peer lookup protocol for internet applications , 2003, TNET.
[10] Srdjan Capkun,et al. BISS: building secure routing out of an incomplete set of security associations , 2003, WiSe '03.
[11] Virgil D. Gligor,et al. On Inter-Realm Authentication in Large Distributed Systems , 1993, J. Comput. Secur..
[12] Thomas Beth,et al. Valuation of Trust in Open Networks , 1994, ESORICS.
[13] Jitendra Padhye,et al. Routing in multi-radio, multi-hop wireless mesh networks , 2004, MobiCom '04.
[14] Joan Feigenbaum,et al. The Role of Trust Management in Distributed Systems Security , 2001, Secure Internet Programming.
[15] Hector Garcia-Molina,et al. Limited reputation sharing in P2P systems , 2004, EC '04.
[16] B. Lampson,et al. Authentication in distributed systems: theory and practice , 1991, TOCS.
[17] Srdjan Capkun,et al. Small worlds in security systems: an analysis of the PGP certificate graph , 2002, NSPW '02.
[18] Robert Tappan Morris,et al. Link-level measurements from an 802.11b mesh network , 2004, SIGCOMM '04.
[19] Virgil D. Gilgor,et al. On inter-realm authentication in large distributed systems , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.
[20] Josef Kittler. Autonomic Communication , 2005, Lecture Notes in Computer Science.
[21] Virgil D. Gligor,et al. Security of Emergent Properties in Ad-Hoc Networks (Transcript of Discussion) , 2004, Security Protocols Workshop.
[22] Alan M. Frieze,et al. Random graphs , 2006, SODA '06.
[23] Massimo Franceschetti,et al. On the throughput capacity of random wireless networks , 2004 .
[24] Béla Bollobás,et al. Random Graphs: Notation , 2001 .
[25] John S. Baras,et al. On Trust Establishment in Mobile Ad-Hoc Networks , 2002, Security Protocols Workshop.
[26] Sharon L. Milgram,et al. The Small World Problem , 1967 .
[27] Eric Bonabeau,et al. Decision Spread in the Corporate Board Network , 2003, Adv. Complex Syst..
[28] Jeffrey I. Schiller,et al. An Authentication Service for Open Network Systems. In , 1998 .
[29] David J. Aldous,et al. Lower bounds for covering times for reversible Markov chains and random walks on graphs , 1989 .
[30] Hector Garcia-Molina,et al. The Eigentrust algorithm for reputation management in P2P networks , 2003, WWW '03.
[31] J. Laurie Snell,et al. Markov Random Fields and Their Applications , 1980 .
[32] David R. Karger,et al. Chord: A scalable peer-to-peer lookup service for internet applications , 2001, SIGCOMM '01.
[33] Bhaskar Krishnamachari,et al. Sharp thresholds For monotone properties in random geometric graphs , 2003, STOC '04.