Towards Identifying Features of Trust in Mobile Ad Hoc Network
暂无分享,去创建一个
[1] Mukesh Singhal,et al. A Secure Routing Protocol for Wireless Ad Hoc Networks , 2006, Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06).
[2] Chris McDonald,et al. Establishing Trust In Pure Ad-hoc Networks , 2004, ACSC.
[3] Yih-Chun Hu,et al. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2005, Wirel. Networks.
[4] Xu Qiao-ping,et al. Secure On-demand Routing Protocol for Ad Hoc Network , 2010 .
[5] Azzedine Boukerche. Handbook of Algorithms for Wireless Networking and Mobile Computing , 2005 .
[6] Zheng Yan,et al. Trust Evaluation Based Security Solution in Ad Hoc Networks , 2003 .
[7] Haiyun Luo,et al. Security in mobile ad hoc networks: challenges and solutions , 2004, IEEE Wireless Communications.
[8] Stephen Hailes,et al. A distributed trust model , 1998, NSPW '97.
[9] Zhuoqing Morley Mao,et al. Toward understanding distributed blackhole placement , 2004, WORM '04.
[10] Chung-wei Lee,et al. Trust based adaptive on demand ad hoc routing protocol , 2004, ACM-SE 42.
[11] Loay Abusalah,et al. TARP: trust-aware routing protocol , 2006, IWCMC '06.
[12] John S. Baras,et al. On Trust Establishment in Mobile Ad-Hoc Networks , 2002, Security Protocols Workshop.
[13] George Kesidis,et al. Secure routing in ad hoc networks and a related intrusion detection problem , 2003, IEEE Military Communications Conference, 2003. MILCOM 2003..
[14] John S. Baras,et al. Trust evaluation in ad-hoc networks , 2004, WiSe '04.
[15] Xia Wang,et al. Specification Synthesis for Monitoring and Analysis of MANET Protocols , 2007, 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07).
[16] J. H. Davis,et al. An Integrative Model Of Organizational Trust , 1995 .
[17] Zygmunt J. Haas,et al. Securing ad hoc networks , 1999, IEEE Netw..