Developing a model for trust management in pervasive devices
暂无分享,去创建一个
[1] Donald E. Eastlake,et al. Domain Name System Security Extensions , 1997, RFC.
[2] Srdjan Capkun,et al. Self-Organized Public-Key Management for Mobile Ad Hoc Networks , 2003, IEEE Trans. Mob. Comput..
[3] Audun Jøsang,et al. An Algebra for Assessing Trust in Certification Chains , 1999, NDSS.
[4] Celeste Campo,et al. PTM: A Pervasive Trust Management Model for Dynamic Open Environments ⁄ , 2003 .
[5] Andrés Marín López,et al. Secure Ad-Hoc mBusiness: EnhancingWindowsCE Security , 2004, TrustBus.
[6] Stephen Marsh,et al. Formalising Trust as a Computational Concept , 1994 .
[7] Philip R. Zimmermann,et al. The official PGP user's guide , 1996 .
[8] R. Chen,et al. Poblano A Distributed Trust Model for Peer-to-Peer Networks , 2001 .
[9] Audun J sang,et al. An Algebra for Assessing Trust in Certi cation Chains , 1998 .
[10] Bruno O. Shubert,et al. Random variables and stochastic processes , 1979 .
[11] Jean-Yves Le Boudec,et al. Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.
[12] Sarvapali D. Ramchurn,et al. Trust evaluation through relationship analysis , 2005, AAMAS '05.
[13] Robert H. Deng,et al. Highly reliable trust establishment scheme in ad hoc networks , 2004, Comput. Networks.
[14] Ueli Maurer,et al. Modelling a Public-Key Infrastructure , 1996, ESORICS.
[15] P. Vannoorenberghe,et al. Strategies for combining conflicting dogmatic beliefs , 2003, Sixth International Conference of Information Fusion, 2003. Proceedings of the.
[16] John G. Proakis,et al. Probability, random variables and stochastic processes , 1985, IEEE Trans. Acoust. Speech Signal Process..
[17] Jean-Yves Le Boudec,et al. Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.