Trustworthy Wireless Networks : Issues and Applications
暂无分享,去创建一个
[1] Yong Sheng,et al. Detecting 802.11 MAC Layer Spoofing Using Received Signal Strength , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[2] Ricardo Staciarini Puttini,et al. Security in Ad Hoc Networks: a General Intrusion Detection Architecture Enhancing Trust Based Approaches , 2002, Wireless Information Systems.
[3] Prasant Mohapatra,et al. Provenance-Based Information Trustworthiness Evaluation in Multi-Hop Networks , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.
[4] Jie Wu,et al. Mobility Reduces Uncertainty in MANETs , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[5] Marcin Detyniecki,et al. Mathematical Aggregation Operators and their Application to Video Querying , 2000 .
[6] P. Lamsal. Understanding Trust and Security , 2001 .
[7] Mariëlle den Hengst,et al. Proceedings of the 34th annual Hawaii International Conference on System Sciences , 2001 .
[8] Jennifer Golbeck. Computing withTrust: Definition, Properties, and Algorithms (Invited Paper) , 2006 .
[9] G.M. Coates,et al. A Trust System Architecture for SCADA Network Security , 2010, IEEE Transactions on Power Delivery.
[10] Zhou Su,et al. Malicious node detection in wireless sensor networks using weighted trust evaluation , 2008, SpringSim '08.
[11] Larry J. Greenstein,et al. Fingerprints in the Ether: Using the Physical Layer for Wireless Authentication , 2007, 2007 IEEE International Conference on Communications.
[12] Yanjun Zuo,et al. Information trustworthiness evaluation based on trust combination , 2006, SAC '06.
[13] Larry J. Greenstein,et al. Using the physical layer for wireless authentication in time-variant channels , 2008, IEEE Transactions on Wireless Communications.