Secure checkpointing-recovery using trusted nodes in MANET
暂无分享,去创建一个
[1] Heon Young Yeom,et al. An efficient recovery scheme for fault-tolerant mobile computing systems , 2003, Future Gener. Comput. Syst..
[2] Xue Liu,et al. A trust model based on fuzzy recommendation for mobile ad-hoc networks , 2009, Comput. Networks.
[3] G. Pulla,et al. A SURVEY ON TRUST MANAGEMENT FOR MOBILE AD HOC NETWORKS , 2010 .
[4] P. Dey,et al. Trusted checkpointing based on ant colony optimization in MANET , 2012, 2012 Third International Conference on Emerging Applications of Information Technology.
[5] Dongsheng Wang,et al. An Efficient Handoff Strategy for Mobile Computing Checkpoint System , 2007, EUC.
[6] Jie Wu,et al. Mobility Reduces Uncertainty in MANETs , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[7] Ruoyu Wu,et al. Risk-Aware Response for Mitigating MANET Routing Attacks , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.
[8] Dang Quan Nguyen,et al. A trust-based security architecture for tactical MANETS , 2008, MILCOM 2008 - 2008 IEEE Military Communications Conference.
[9] Awadhesh Kumar Singh,et al. Staggered Checkpointing and Recovery in Cluster Based Mobile Ad Hoc Networks , 2011 .
[10] Tracy Camp,et al. A survey of mobility models for ad hoc network research , 2002, Wirel. Commun. Mob. Comput..
[11] Xiang Li,et al. An Efficient Checkpointing and Rollback Recovery Scheme for Cluster-Based Multi-channel Ad Hoc Wireless Networks , 2008, 2008 IEEE International Symposium on Parallel and Distributed Processing with Applications.
[12] Audun J sang,et al. An Algebra for Assessing Trust in Certi cation Chains , 1998 .
[13] Sarmistha Neogy,et al. Checkpointing and Recovery Using Node Mobility among Clusters in Mobile Ad Hoc Network , 2012, ACITY.
[14] Audun Jøsang,et al. An Algebra for Assessing Trust in Certification Chains , 1999, NDSS.
[15] Sarmistha Neogy,et al. Secure checkpointing using public key cryptography in mobile computing , 2011, 2011 Fifth IEEE International Conference on Advanced Telecommunication Systems and Networks (ANTS).
[16] Nuno Neves,et al. Adaptive checkpointinng with storage management for mobile environments , 1999 .
[17] Mukesh Singhal,et al. Low-Cost Checkpointing and Failure Recovery in Mobile Computing Systems , 1996, IEEE Trans. Parallel Distributed Syst..
[18] Yookun Cho,et al. Kckpt : Checkpoint and Recovery Facility on UnixWare , 2007 .
[19] Ing-Ray Chen,et al. Movement-based checkpointing and logging for recovery in mobile computing systems , 2006, MobiDE '06.
[20] Jong Kim,et al. Secure checkpointing , 2003, J. Syst. Archit..
[21] Zheng Yan,et al. Trust Evaluation Based Security Solution in Ad Hoc Networks , 2003 .
[22] Zhifeng Zhao,et al. Availability based trust model of clusters for MANET , 2010, 2010 7th International Conference on Service Systems and Service Management.
[23] Michael Gegick. Failure-prone components are also attack-prone components , 2008, OOPSLA Companion.